18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:33:51 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1410.753510] loop0: detected capacity change from 0 to 264192 [ 1410.769535] loop2: detected capacity change from 0 to 264192 [ 1410.782826] loop0: detected capacity change from 0 to 256 [ 1410.790874] loop2: detected capacity change from 0 to 256 [ 1410.802433] loop4: detected capacity change from 0 to 264192 [ 1410.802842] loop5: detected capacity change from 0 to 264192 [ 1410.809468] loop1: detected capacity change from 0 to 264192 [ 1410.820232] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1410.822653] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1410.838043] loop4: detected capacity change from 0 to 256 22:33:51 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1410.878787] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1410.880196] loop5: detected capacity change from 0 to 256 [ 1410.889715] loop1: detected capacity change from 0 to 256 [ 1410.898273] loop3: detected capacity change from 0 to 264192 [ 1410.911042] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1410.922123] loop6: detected capacity change from 0 to 264192 [ 1410.933453] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:33:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x0, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1410.952704] loop3: detected capacity change from 0 to 256 [ 1410.983281] loop6: detected capacity change from 0 to 256 [ 1410.983959] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1411.042638] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:33:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1411.081737] loop0: detected capacity change from 0 to 264192 22:33:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:33:52 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:33:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:33:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:33:52 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:33:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x0, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1411.257766] loop1: detected capacity change from 0 to 264192 [ 1411.285063] loop1: detected capacity change from 0 to 256 [ 1411.304293] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1411.305645] loop4: detected capacity change from 0 to 264192 [ 1411.318075] loop5: detected capacity change from 0 to 264192 [ 1411.320199] loop3: detected capacity change from 0 to 264192 [ 1411.336068] loop4: detected capacity change from 0 to 256 [ 1411.347842] loop2: detected capacity change from 0 to 264192 [ 1411.356296] loop5: detected capacity change from 0 to 256 [ 1411.357136] loop3: detected capacity change from 0 to 256 [ 1411.362991] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1411.375237] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1411.378274] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1411.392171] loop2: detected capacity change from 0 to 256 [ 1411.426116] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1411.446207] loop6: detected capacity change from 0 to 264192 [ 1411.490859] loop6: detected capacity change from 0 to 256 [ 1411.514131] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:09 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x0, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:34:09 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:09 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:34:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:09 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r6 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:34:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1428.154440] loop2: detected capacity change from 0 to 264192 [ 1428.156252] loop4: detected capacity change from 0 to 264192 [ 1428.159420] loop5: detected capacity change from 0 to 264192 [ 1428.175909] loop1: detected capacity change from 0 to 264192 [ 1428.183710] loop0: detected capacity change from 0 to 264192 [ 1428.185270] loop5: detected capacity change from 0 to 256 [ 1428.186681] loop2: detected capacity change from 0 to 256 [ 1428.188521] loop4: detected capacity change from 0 to 256 [ 1428.197489] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1428.199139] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1428.200323] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1428.206474] loop0: detected capacity change from 0 to 256 [ 1428.226603] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1428.240113] loop1: detected capacity change from 0 to 256 [ 1428.262195] loop6: detected capacity change from 0 to 256 22:34:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1428.296514] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1428.309217] loop3: detected capacity change from 0 to 264192 [ 1428.328722] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1428.329714] loop5: detected capacity change from 0 to 264192 22:34:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1428.352753] loop5: detected capacity change from 0 to 256 [ 1428.356229] loop3: detected capacity change from 0 to 256 [ 1428.357582] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:09 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1428.389952] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:09 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1428.496937] loop2: detected capacity change from 0 to 264192 [ 1428.514004] loop2: detected capacity change from 0 to 256 [ 1428.517903] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:09 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r6 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1428.530486] loop0: detected capacity change from 0 to 264192 [ 1428.552086] loop0: detected capacity change from 0 to 256 [ 1428.569252] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1428.612561] loop3: detected capacity change from 0 to 264192 [ 1428.625882] loop3: detected capacity change from 0 to 256 [ 1428.630082] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:24 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:34:24 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:34:24 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:24 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:34:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:24 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:34:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1443.471170] loop4: detected capacity change from 0 to 264192 [ 1443.475887] loop0: detected capacity change from 0 to 264192 [ 1443.479981] loop5: detected capacity change from 0 to 264192 [ 1443.486237] loop4: detected capacity change from 0 to 256 [ 1443.496785] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1443.496996] loop5: detected capacity change from 0 to 256 [ 1443.504770] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1443.508805] loop1: detected capacity change from 0 to 264192 [ 1443.524272] loop0: detected capacity change from 0 to 256 [ 1443.540905] loop2: detected capacity change from 0 to 264192 22:34:24 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1443.566172] loop1: detected capacity change from 0 to 256 [ 1443.574541] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1443.589224] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1443.591857] loop2: detected capacity change from 0 to 256 22:34:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1443.617960] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1443.709020] loop5: detected capacity change from 0 to 264192 22:34:24 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:24 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x406, r0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r3, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) 22:34:24 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:34:24 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1443.763027] loop5: detected capacity change from 0 to 256 [ 1443.784487] loop4: detected capacity change from 0 to 264192 [ 1443.795730] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1443.863406] loop0: detected capacity change from 0 to 264192 [ 1443.894954] loop0: detected capacity change from 0 to 256 [ 1443.909098] loop1: detected capacity change from 0 to 264192 22:34:25 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1443.921149] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1443.926103] loop2: detected capacity change from 0 to 264192 [ 1443.927848] loop3: detected capacity change from 0 to 256 [ 1443.936290] loop1: detected capacity change from 0 to 256 [ 1443.960245] loop2: detected capacity change from 0 to 256 [ 1443.962107] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1443.965115] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1443.984504] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1444.056676] loop5: detected capacity change from 0 to 264192 [ 1444.080265] loop5: detected capacity change from 0 to 256 [ 1444.099996] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:34:39 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:34:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:34:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:34:39 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1458.516530] loop6: detected capacity change from 0 to 264192 [ 1458.540726] loop6: detected capacity change from 0 to 256 [ 1458.548112] loop1: detected capacity change from 0 to 264192 [ 1458.551624] loop0: detected capacity change from 0 to 264192 [ 1458.557202] loop1: detected capacity change from 0 to 256 [ 1458.557273] loop4: detected capacity change from 0 to 264192 [ 1458.559910] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1458.572775] loop5: detected capacity change from 0 to 264192 [ 1458.574311] loop0: detected capacity change from 0 to 256 [ 1458.574788] loop2: detected capacity change from 0 to 264192 [ 1458.579538] loop3: detected capacity change from 0 to 264192 [ 1458.580096] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1458.585862] loop4: detected capacity change from 0 to 256 [ 1458.594728] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1458.603303] loop5: detected capacity change from 0 to 256 [ 1458.603788] loop3: detected capacity change from 0 to 256 [ 1458.606073] loop2: detected capacity change from 0 to 256 [ 1458.618918] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1458.619958] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1458.622839] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1458.633622] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:34:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1458.716443] loop1: detected capacity change from 0 to 264192 [ 1458.720704] loop6: detected capacity change from 0 to 264192 [ 1458.732701] loop1: detected capacity change from 0 to 256 22:34:39 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1458.741066] I/O error, dev loop6, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1458.742005] Buffer I/O error on dev loop6, logical block 0, async page read [ 1458.742568] loop6: unable to read partition table [ 1458.746627] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1458.750981] loop6: partition table beyond EOD, truncated 22:34:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1458.762474] loop6: detected capacity change from 0 to 256 [ 1458.766500] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:39 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1458.819236] loop4: detected capacity change from 0 to 264192 22:34:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1458.838623] loop4: detected capacity change from 0 to 256 [ 1458.860130] loop0: detected capacity change from 0 to 264192 [ 1458.865021] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1458.867913] loop3: detected capacity change from 0 to 264192 [ 1458.885860] loop0: detected capacity change from 0 to 256 [ 1458.887315] loop3: detected capacity change from 0 to 256 [ 1458.893851] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1458.907694] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1458.913719] loop2: detected capacity change from 0 to 264192 [ 1458.915985] loop5: detected capacity change from 0 to 264192 [ 1458.950675] loop1: detected capacity change from 0 to 264192 [ 1458.963310] loop2: detected capacity change from 0 to 256 [ 1458.967083] loop5: detected capacity change from 0 to 256 [ 1459.006576] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1459.008965] loop1: detected capacity change from 0 to 256 [ 1459.013774] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1459.044504] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:52 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:34:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:34:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:34:52 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:34:52 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1471.575495] loop4: detected capacity change from 0 to 264192 [ 1471.577147] loop5: detected capacity change from 0 to 264192 [ 1471.592699] loop4: detected capacity change from 0 to 256 [ 1471.593317] loop5: detected capacity change from 0 to 256 [ 1471.601886] loop2: detected capacity change from 0 to 264192 [ 1471.603573] loop0: detected capacity change from 0 to 264192 [ 1471.606629] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1471.608993] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1471.611622] loop2: detected capacity change from 0 to 256 [ 1471.630524] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1471.636802] loop1: detected capacity change from 0 to 264192 [ 1471.643493] loop0: detected capacity change from 0 to 256 [ 1471.661650] loop1: detected capacity change from 0 to 256 [ 1471.670720] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:34:52 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1471.691194] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1471.698647] loop6: detected capacity change from 0 to 264192 22:34:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:34:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1471.747685] loop6: detected capacity change from 0 to 256 [ 1471.774942] loop4: detected capacity change from 0 to 264192 [ 1471.775091] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1471.796127] loop2: detected capacity change from 0 to 264192 [ 1471.810772] loop5: detected capacity change from 0 to 264192 [ 1471.820122] loop2: detected capacity change from 0 to 256 [ 1471.840302] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:52 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:34:52 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1471.842327] loop5: detected capacity change from 0 to 256 22:34:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1471.898530] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:34:53 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1471.926158] loop1: detected capacity change from 0 to 264192 [ 1471.956220] loop1: detected capacity change from 0 to 256 [ 1471.973024] loop0: detected capacity change from 0 to 264192 [ 1471.982689] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1471.988327] loop3: detected capacity change from 0 to 264192 [ 1472.021936] loop0: detected capacity change from 0 to 256 [ 1472.027866] loop3: detected capacity change from 0 to 256 [ 1472.065571] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1472.068127] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:09 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:35:09 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:09 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:09 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:35:09 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:35:09 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:09 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1488.101137] loop0: detected capacity change from 0 to 264192 [ 1488.102791] loop2: detected capacity change from 0 to 264192 22:35:09 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1488.124025] loop0: detected capacity change from 0 to 256 [ 1488.133156] loop2: detected capacity change from 0 to 256 [ 1488.139013] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1488.140561] loop4: detected capacity change from 0 to 264192 [ 1488.147539] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1488.168963] loop4: detected capacity change from 0 to 256 [ 1488.176257] loop6: detected capacity change from 0 to 264192 [ 1488.182083] loop1: detected capacity change from 0 to 264192 [ 1488.183629] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1488.185886] loop5: detected capacity change from 0 to 264192 [ 1488.214768] loop5: detected capacity change from 0 to 256 [ 1488.218099] loop6: detected capacity change from 0 to 256 [ 1488.220540] loop1: detected capacity change from 0 to 256 [ 1488.225435] loop3: detected capacity change from 0 to 264192 [ 1488.231504] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1488.246068] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1488.248547] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1488.275309] loop3: detected capacity change from 0 to 256 [ 1488.304529] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1502.667007] loop5: detected capacity change from 0 to 264192 22:35:23 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:23 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:23 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:35:23 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:23 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b0"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:23 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:35:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1502.678003] loop5: detected capacity change from 0 to 256 [ 1502.699653] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1502.708959] loop2: detected capacity change from 0 to 264192 [ 1502.710509] loop1: detected capacity change from 0 to 264192 [ 1502.727847] loop2: detected capacity change from 0 to 256 [ 1502.733004] loop1: detected capacity change from 0 to 256 22:35:23 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1502.737463] loop3: detected capacity change from 0 to 264192 [ 1502.740033] loop0: detected capacity change from 0 to 264192 [ 1502.742666] loop4: detected capacity change from 0 to 264192 [ 1502.742808] loop6: detected capacity change from 0 to 264192 [ 1502.752759] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1502.757726] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1502.766409] loop6: detected capacity change from 0 to 256 [ 1502.767701] loop3: detected capacity change from 0 to 256 [ 1502.768187] loop0: detected capacity change from 0 to 256 [ 1502.776091] loop4: detected capacity change from 0 to 256 [ 1502.786759] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1502.788926] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1502.794902] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1502.800881] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:23 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1502.845750] loop5: detected capacity change from 0 to 264192 22:35:23 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:35:24 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:24 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:35:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:24 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1503.007556] loop2: detected capacity change from 0 to 264192 22:35:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b0"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:24 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1503.032958] loop2: detected capacity change from 0 to 256 [ 1503.036091] loop6: detected capacity change from 0 to 264192 22:35:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1503.058780] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1503.074959] loop6: detected capacity change from 0 to 256 [ 1503.081589] loop4: detected capacity change from 0 to 264192 [ 1503.084647] loop3: detected capacity change from 0 to 264192 [ 1503.087646] loop0: detected capacity change from 0 to 264192 [ 1503.087901] loop1: detected capacity change from 0 to 264192 [ 1503.095704] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1503.117283] loop4: detected capacity change from 0 to 256 [ 1503.123203] loop3: detected capacity change from 0 to 256 [ 1503.124883] loop0: detected capacity change from 0 to 256 [ 1503.127798] loop1: detected capacity change from 0 to 256 [ 1503.143504] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1503.147970] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1503.155815] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1503.169928] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:24 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:24 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:35:24 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1503.348968] loop2: detected capacity change from 0 to 264192 [ 1503.364811] loop2: detected capacity change from 0 to 256 [ 1503.374978] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:37 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) 22:35:37 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:37 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:35:37 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1516.850315] loop6: detected capacity change from 0 to 264192 22:35:37 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:35:37 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:35:37 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:37 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b0"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1516.888018] loop6: detected capacity change from 0 to 256 [ 1516.897025] loop5: detected capacity change from 0 to 264192 [ 1516.898615] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1516.908935] loop2: detected capacity change from 0 to 264192 [ 1516.914627] loop1: detected capacity change from 0 to 264192 [ 1516.914680] loop5: detected capacity change from 0 to 256 [ 1516.919580] loop4: detected capacity change from 0 to 264192 [ 1516.927242] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1516.931511] loop0: detected capacity change from 0 to 264192 [ 1516.942604] loop2: detected capacity change from 0 to 256 [ 1516.947491] loop1: detected capacity change from 0 to 256 [ 1516.958839] loop0: detected capacity change from 0 to 256 [ 1516.963850] loop4: detected capacity change from 0 to 256 [ 1516.971278] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1516.973602] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:38 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1516.986776] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1516.995518] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:38 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:35:38 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:35:38 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) [ 1517.073576] loop5: detected capacity change from 0 to 264192 [ 1517.076863] loop6: detected capacity change from 0 to 264192 [ 1517.089031] loop5: detected capacity change from 0 to 256 [ 1517.093130] loop3: detected capacity change from 0 to 264192 [ 1517.100872] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:38 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:35:38 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:38 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1517.136578] loop3: detected capacity change from 0 to 256 [ 1517.152289] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:38 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:38 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1517.228965] loop0: detected capacity change from 0 to 264192 [ 1517.244695] loop2: detected capacity change from 0 to 264192 [ 1517.251312] loop0: detected capacity change from 0 to 256 [ 1517.257046] loop4: detected capacity change from 0 to 264192 [ 1517.257297] loop6: detected capacity change from 0 to 264192 [ 1517.259700] loop1: detected capacity change from 0 to 264192 [ 1517.260927] loop2: detected capacity change from 0 to 256 [ 1517.263905] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1517.271976] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1517.279588] loop6: detected capacity change from 0 to 256 [ 1517.289092] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1517.289229] loop4: detected capacity change from 0 to 256 [ 1517.293833] loop1: detected capacity change from 0 to 256 [ 1517.310609] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1517.321567] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:50 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:35:50 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r3, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) 22:35:50 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:35:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 22:35:50 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:50 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1529.265072] loop0: detected capacity change from 0 to 264192 [ 1529.270303] loop2: detected capacity change from 0 to 264192 [ 1529.281204] loop0: detected capacity change from 0 to 256 [ 1529.284840] loop2: detected capacity change from 0 to 256 [ 1529.290752] loop1: detected capacity change from 0 to 264192 [ 1529.290864] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.294131] loop5: detected capacity change from 0 to 264192 [ 1529.295529] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.304188] loop4: detected capacity change from 0 to 264192 [ 1529.322260] loop1: detected capacity change from 0 to 256 [ 1529.326134] loop4: detected capacity change from 0 to 256 [ 1529.333539] loop5: detected capacity change from 0 to 256 [ 1529.342025] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.355584] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.363117] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:50 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:50 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:50 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 22:35:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:50 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:35:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1529.460831] loop2: detected capacity change from 0 to 264192 [ 1529.466404] loop0: detected capacity change from 0 to 264192 [ 1529.473296] loop2: detected capacity change from 0 to 256 22:35:50 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1529.500627] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:35:50 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1529.526384] loop4: detected capacity change from 0 to 264192 [ 1529.536393] loop6: detected capacity change from 0 to 264192 [ 1529.548532] loop4: detected capacity change from 0 to 256 [ 1529.564054] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.569133] loop5: detected capacity change from 0 to 264192 [ 1529.571276] loop1: detected capacity change from 0 to 264192 [ 1529.573469] loop3: detected capacity change from 0 to 264192 [ 1529.581797] loop6: detected capacity change from 0 to 256 [ 1529.587927] loop1: detected capacity change from 0 to 256 [ 1529.589466] loop5: detected capacity change from 0 to 256 22:35:50 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="0100000001000000180000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1529.596859] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.598129] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.616482] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.621158] loop3: detected capacity change from 0 to 256 [ 1529.644884] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.658085] loop2: detected capacity change from 0 to 264192 22:35:50 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1529.680732] loop2: detected capacity change from 0 to 256 [ 1529.691597] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1529.753051] loop4: detected capacity change from 0 to 264192 [ 1529.779643] loop4: detected capacity change from 0 to 256 [ 1529.785113] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:04 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:04 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:36:04 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, 0x0) 22:36:04 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:36:04 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:36:04 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1543.408296] loop5: detected capacity change from 0 to 264192 [ 1543.423605] loop5: detected capacity change from 0 to 256 [ 1543.436237] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1543.438574] loop1: detected capacity change from 0 to 264192 [ 1543.450233] loop0: detected capacity change from 0 to 264192 [ 1543.465047] loop0: detected capacity change from 0 to 256 [ 1543.471876] loop1: detected capacity change from 0 to 256 [ 1543.480092] loop2: detected capacity change from 0 to 264192 [ 1543.482775] loop4: detected capacity change from 0 to 264192 [ 1543.490085] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1543.492011] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1543.512132] loop2: detected capacity change from 0 to 256 [ 1543.514648] loop4: detected capacity change from 0 to 256 [ 1543.541791] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1543.546620] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:17 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:17 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:17 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r4, &(0x7f0000000180)=""/16, 0x2f00, 0x79) 22:36:17 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:36:17 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:36:17 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:17 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:36:17 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1556.786301] loop6: detected capacity change from 0 to 264192 [ 1556.798438] loop6: detected capacity change from 0 to 256 [ 1556.802923] loop2: detected capacity change from 0 to 264192 [ 1556.809230] loop1: detected capacity change from 0 to 264192 [ 1556.812568] loop5: detected capacity change from 0 to 264192 [ 1556.814067] loop2: detected capacity change from 0 to 256 [ 1556.814733] loop0: detected capacity change from 0 to 264192 [ 1556.819032] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1556.822120] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1556.833074] loop5: detected capacity change from 0 to 256 [ 1556.837158] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1556.847099] loop0: detected capacity change from 0 to 256 [ 1556.859720] loop1: detected capacity change from 0 to 256 [ 1556.874958] loop4: detected capacity change from 0 to 264192 [ 1556.876860] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, 0x0, 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1556.895839] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:18 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1556.918813] loop4: detected capacity change from 0 to 256 [ 1556.922896] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:18 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) 22:36:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1556.981851] loop2: detected capacity change from 0 to 264192 [ 1556.982821] loop5: detected capacity change from 0 to 264192 [ 1556.998699] loop5: detected capacity change from 0 to 256 [ 1557.002839] loop2: detected capacity change from 0 to 256 [ 1557.011252] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1557.016007] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1557.039623] loop6: detected capacity change from 0 to 264192 22:36:18 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r4, &(0x7f0000000180)=""/16, 0x2f00, 0x79) 22:36:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:18 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:36:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:18 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1557.127039] loop3: detected capacity change from 0 to 264192 [ 1557.154828] loop4: detected capacity change from 0 to 264192 [ 1557.162064] loop3: detected capacity change from 0 to 256 [ 1557.165234] loop0: detected capacity change from 0 to 264192 [ 1557.170217] loop1: detected capacity change from 0 to 264192 [ 1557.174107] loop4: detected capacity change from 0 to 256 [ 1557.181951] loop5: detected capacity change from 0 to 264192 22:36:18 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1557.185877] loop2: detected capacity change from 0 to 264192 [ 1557.190627] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1557.195734] loop5: detected capacity change from 0 to 256 [ 1557.204934] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1557.207566] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:18 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) [ 1557.216999] loop1: detected capacity change from 0 to 256 [ 1557.229096] loop2: detected capacity change from 0 to 256 [ 1557.229303] loop0: detected capacity change from 0 to 256 [ 1557.235222] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1557.235648] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1557.242733] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:18 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:36:18 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:36:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1557.365558] loop4: detected capacity change from 0 to 264192 [ 1557.368394] loop5: detected capacity change from 0 to 264192 [ 1557.376024] loop4: detected capacity change from 0 to 256 [ 1557.387774] loop5: detected capacity change from 0 to 256 [ 1557.393112] loop2: detected capacity change from 0 to 264192 [ 1557.396941] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1557.399334] loop3: detected capacity change from 0 to 256 [ 1557.404506] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1557.409608] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1557.409916] loop2: detected capacity change from 0 to 256 [ 1557.423858] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:32 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r4, &(0x7f0000000180)=""/16, 0x2f00, 0x79) 22:36:32 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:36:32 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:36:32 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r4, &(0x7f0000000180)=""/16, 0x2f00, 0x79) 22:36:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000000000", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:36:32 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:32 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1571.415968] loop4: detected capacity change from 0 to 264192 [ 1571.422116] loop5: detected capacity change from 0 to 264192 [ 1571.434077] loop1: detected capacity change from 0 to 264192 [ 1571.436184] loop2: detected capacity change from 0 to 264192 [ 1571.439780] loop5: detected capacity change from 0 to 256 [ 1571.444311] loop4: detected capacity change from 0 to 256 [ 1571.449561] loop1: detected capacity change from 0 to 256 [ 1571.453106] loop2: detected capacity change from 0 to 256 [ 1571.454585] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1571.460996] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1571.464619] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1571.472516] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1571.483685] loop0: detected capacity change from 0 to 264192 22:36:32 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000000000", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1571.524976] loop0: detected capacity change from 0 to 256 22:36:32 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:32 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1571.561504] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:32 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r4, &(0x7f0000000180)=""/16, 0x2f00, 0x79) 22:36:32 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r4, &(0x7f0000000180)=""/16, 0x2f00, 0x79) 22:36:32 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1571.622400] loop1: detected capacity change from 0 to 264192 [ 1571.624601] loop2: detected capacity change from 0 to 264192 [ 1571.638787] loop1: detected capacity change from 0 to 256 [ 1571.640159] loop2: detected capacity change from 0 to 256 [ 1571.648455] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1571.651714] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1571.653737] loop5: detected capacity change from 0 to 264192 [ 1571.687631] loop5: detected capacity change from 0 to 256 [ 1571.702496] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1571.732045] loop3: detected capacity change from 0 to 256 [ 1571.750816] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:45 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000000000", @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:36:45 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) 22:36:45 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:45 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:45 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r4, &(0x7f0000000180)=""/16, 0x2f00, 0x79) 22:36:45 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:45 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1584.497808] loop4: detected capacity change from 0 to 264192 [ 1584.504985] loop5: detected capacity change from 0 to 264192 [ 1584.509055] loop2: detected capacity change from 0 to 264192 [ 1584.517501] loop4: detected capacity change from 0 to 256 [ 1584.520217] loop3: detected capacity change from 0 to 264192 [ 1584.520813] loop1: detected capacity change from 0 to 264192 [ 1584.522868] loop0: detected capacity change from 0 to 264192 [ 1584.538998] loop2: detected capacity change from 0 to 256 [ 1584.541070] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.541202] loop5: detected capacity change from 0 to 256 [ 1584.544702] loop1: detected capacity change from 0 to 256 [ 1584.549958] loop0: detected capacity change from 0 to 256 [ 1584.554693] loop3: detected capacity change from 0 to 256 [ 1584.561805] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.567972] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.569958] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.572185] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.575076] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:45 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:36:45 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:45 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) 22:36:45 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:45 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, 0x0, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:45 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:36:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/192, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:36:45 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x0) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1584.765892] loop1: detected capacity change from 0 to 264192 [ 1584.770530] loop7: detected capacity change from 0 to 264192 [ 1584.773859] loop2: detected capacity change from 0 to 264192 [ 1584.784062] loop0: detected capacity change from 0 to 264192 [ 1584.785910] loop6: detected capacity change from 0 to 264192 [ 1584.788739] loop7: detected capacity change from 0 to 256 [ 1584.788757] loop5: detected capacity change from 0 to 264192 [ 1584.789954] loop2: detected capacity change from 0 to 256 [ 1584.791064] loop1: detected capacity change from 0 to 256 [ 1584.796767] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.800766] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.802563] loop0: detected capacity change from 0 to 256 [ 1584.802960] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.805079] loop6: detected capacity change from 0 to 256 [ 1584.809769] loop5: detected capacity change from 0 to 256 22:36:45 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1584.817176] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.820246] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.826378] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:36:45 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:36:45 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(0xffffffffffffffff, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:36:45 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1584.902802] loop4: detected capacity change from 0 to 264192 [ 1584.939814] loop4: detected capacity change from 0 to 256 [ 1584.947456] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.955173] loop2: detected capacity change from 0 to 264192 [ 1584.970803] loop2: detected capacity change from 0 to 256 [ 1584.975518] loop1: detected capacity change from 0 to 264192 [ 1584.979865] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1584.985534] loop1: detected capacity change from 0 to 256 [ 1584.990275] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:01 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, 0x0, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:01 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:01 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:37:01 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(0xffffffffffffffff, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:01 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/192, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:37:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:01 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, 0x0, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r6 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1600.065073] loop2: detected capacity change from 0 to 264192 [ 1600.067699] loop0: detected capacity change from 0 to 264192 [ 1600.084803] loop2: detected capacity change from 0 to 256 [ 1600.088617] loop0: detected capacity change from 0 to 256 [ 1600.089544] loop1: detected capacity change from 0 to 264192 [ 1600.095077] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.098157] loop1: detected capacity change from 0 to 256 [ 1600.102626] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.103418] loop7: detected capacity change from 0 to 264192 [ 1600.111840] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.124051] loop4: detected capacity change from 0 to 264192 [ 1600.135821] loop5: detected capacity change from 0 to 264192 [ 1600.143141] loop4: detected capacity change from 0 to 256 [ 1600.144271] loop7: detected capacity change from 0 to 256 [ 1600.162976] loop6: detected capacity change from 0 to 264192 [ 1600.164231] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.164775] loop5: detected capacity change from 0 to 256 22:37:01 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(0xffffffffffffffff, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:01 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, 0x0, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1600.185572] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.196515] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.210577] loop3: detected capacity change from 0 to 264192 22:37:01 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1600.222649] loop6: detected capacity change from 0 to 256 [ 1600.234516] loop3: detected capacity change from 0 to 256 [ 1600.245301] loop0: detected capacity change from 0 to 264192 22:37:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1600.252736] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.257873] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.258126] loop0: detected capacity change from 0 to 256 [ 1600.270689] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:01 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1600.334444] loop4: detected capacity change from 0 to 264192 [ 1600.351565] loop4: detected capacity change from 0 to 256 [ 1600.366089] loop1: detected capacity change from 0 to 264192 [ 1600.369785] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.399861] loop1: detected capacity change from 0 to 256 [ 1600.407250] loop2: detected capacity change from 0 to 264192 [ 1600.414663] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1600.431295] loop2: detected capacity change from 0 to 256 [ 1600.441680] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:16 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:16 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, 0x0, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:37:16 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/192, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:37:16 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:16 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:37:16 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) 22:37:16 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) 22:37:16 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1615.134731] loop5: detected capacity change from 0 to 264192 [ 1615.139266] loop4: detected capacity change from 0 to 264192 [ 1615.141181] loop2: detected capacity change from 0 to 264192 [ 1615.142213] loop1: detected capacity change from 0 to 264192 [ 1615.145198] loop0: detected capacity change from 0 to 264192 [ 1615.174828] loop2: detected capacity change from 0 to 256 [ 1615.180701] loop0: detected capacity change from 0 to 256 [ 1615.182641] loop4: detected capacity change from 0 to 256 [ 1615.183273] loop1: detected capacity change from 0 to 256 [ 1615.185549] loop5: detected capacity change from 0 to 256 [ 1615.197683] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1615.201657] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1615.207714] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1615.210109] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1615.216100] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:16 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) 22:37:30 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) 22:37:30 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:30 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r6 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) ftruncate(r1, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:30 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, 0x0, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:37:30 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:37:30 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/16, 0x2f00, 0x79) 22:37:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1629.382619] loop1: detected capacity change from 0 to 264192 [ 1629.396177] loop1: detected capacity change from 0 to 256 [ 1629.401566] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1629.418247] loop2: detected capacity change from 0 to 264192 [ 1629.423306] loop4: detected capacity change from 0 to 264192 [ 1629.435120] loop3: detected capacity change from 0 to 264192 22:37:30 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, 0x0, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1629.461449] loop5: detected capacity change from 0 to 264192 [ 1629.461476] loop4: detected capacity change from 0 to 256 [ 1629.463643] loop2: detected capacity change from 0 to 256 [ 1629.466110] loop0: detected capacity change from 0 to 264192 [ 1629.468789] loop3: detected capacity change from 0 to 256 [ 1629.477989] loop5: detected capacity change from 0 to 256 22:37:30 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r6 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) ftruncate(r1, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1629.490687] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1629.496864] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1629.500028] loop0: detected capacity change from 0 to 256 [ 1629.501634] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1629.506045] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1629.529177] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:30 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') [ 1629.552665] loop1: detected capacity change from 0 to 264192 [ 1629.580081] loop6: detected capacity change from 0 to 264192 22:37:30 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1629.597684] loop6: detected capacity change from 0 to 256 [ 1629.607827] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:30 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:37:30 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:30 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:30 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1629.700226] loop0: detected capacity change from 0 to 264192 22:37:30 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) [ 1629.719040] loop2: detected capacity change from 0 to 264192 [ 1629.722440] loop0: detected capacity change from 0 to 256 [ 1629.728830] loop3: detected capacity change from 0 to 264192 [ 1629.733853] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1629.742676] loop5: detected capacity change from 0 to 264192 [ 1629.749193] loop3: detected capacity change from 0 to 256 [ 1629.762660] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1629.764271] loop1: detected capacity change from 0 to 264192 [ 1629.776028] loop5: detected capacity change from 0 to 256 [ 1629.778591] loop4: detected capacity change from 0 to 264192 22:37:30 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1629.800718] loop1: detected capacity change from 0 to 256 22:37:30 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140), 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1629.808518] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1629.812779] loop4: detected capacity change from 0 to 256 [ 1629.827740] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:30 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) [ 1629.841537] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1629.878070] loop0: detected capacity change from 0 to 264192 [ 1629.878884] loop2: detected capacity change from 0 to 264192 22:37:30 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) [ 1629.895392] loop0: detected capacity change from 0 to 256 [ 1629.905730] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:31 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 22:37:31 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140), 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:31 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:37:31 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1630.044861] loop2: detected capacity change from 0 to 264192 [ 1630.055066] loop0: detected capacity change from 0 to 264192 [ 1630.073785] loop0: detected capacity change from 0 to 256 [ 1630.081730] loop5: detected capacity change from 0 to 264192 [ 1630.088037] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1630.102850] loop5: detected capacity change from 0 to 256 [ 1630.104252] loop1: detected capacity change from 0 to 264192 [ 1630.121963] loop1: detected capacity change from 0 to 256 [ 1630.125042] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1630.130297] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:44 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r6 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) ftruncate(r1, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) 22:37:44 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:37:44 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140), 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:44 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:44 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') 22:37:44 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:37:44 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:37:44 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1643.550231] loop1: detected capacity change from 0 to 264192 [ 1643.559278] loop0: detected capacity change from 0 to 264192 [ 1643.594197] loop4: detected capacity change from 0 to 264192 [ 1643.603030] loop1: detected capacity change from 0 to 256 [ 1643.609607] loop0: detected capacity change from 0 to 256 [ 1643.615269] loop5: detected capacity change from 0 to 264192 [ 1643.629997] loop2: detected capacity change from 0 to 264192 [ 1643.646186] loop4: detected capacity change from 0 to 256 [ 1643.650445] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1643.653755] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1643.654711] loop5: detected capacity change from 0 to 256 [ 1643.656944] loop2: detected capacity change from 0 to 256 [ 1643.665090] loop6: detected capacity change from 0 to 264192 [ 1643.673760] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1643.674977] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1643.686302] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1643.687941] loop6: detected capacity change from 0 to 256 [ 1643.698615] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:44 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) 22:37:58 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:58 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) 22:37:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:58 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:58 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:37:58 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140), 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:37:58 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:37:58 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) [ 1657.764683] loop1: detected capacity change from 0 to 264192 [ 1657.767878] loop0: detected capacity change from 0 to 264192 [ 1657.773246] loop5: detected capacity change from 0 to 264192 [ 1657.799182] loop1: detected capacity change from 0 to 256 [ 1657.804441] loop0: detected capacity change from 0 to 256 [ 1657.807664] loop2: detected capacity change from 0 to 264192 [ 1657.810598] loop5: detected capacity change from 0 to 256 [ 1657.819169] loop4: detected capacity change from 0 to 264192 [ 1657.831641] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1657.835314] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1657.847577] loop2: detected capacity change from 0 to 256 [ 1657.854708] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1657.857770] loop4: detected capacity change from 0 to 256 [ 1657.862939] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1657.885211] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:37:59 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x80081280, &(0x7f0000002340)) 22:37:59 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140), 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:37:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:37:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:59 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) 22:37:59 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), 0x0, 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:37:59 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) [ 1658.080752] loop0: detected capacity change from 0 to 264192 [ 1658.089682] loop5: detected capacity change from 0 to 264192 [ 1658.108791] loop0: detected capacity change from 0 to 256 [ 1658.112920] loop5: detected capacity change from 0 to 256 [ 1658.127777] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1658.135737] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1658.148907] loop2: detected capacity change from 0 to 264192 [ 1658.163029] loop2: detected capacity change from 0 to 256 22:37:59 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x80081280, &(0x7f0000002340)) [ 1658.171295] loop4: detected capacity change from 0 to 264192 22:37:59 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140), 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1658.196131] loop4: detected capacity change from 0 to 256 [ 1658.198190] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1658.225827] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1658.269833] loop1: detected capacity change from 0 to 264192 [ 1658.295680] loop1: detected capacity change from 0 to 256 [ 1658.313151] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:38:15 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:15 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:38:15 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x80081280, &(0x7f0000002340)) 22:38:15 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:15 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:38:15 executing program 6: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='setgroups\x00') r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)={{0xcc, 0x6, 0x3, 0x338, 0x96, 0x9, 0x2a6, 0xce8}, "31ae7285efd6c3116542638850f5800a47b2c95c45d36c7d0d00eb3919adf0fb9f998bd0601c2460d5bdeb550d9764f953a5f46c808b92a9983465ca", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x95c) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_setup(0x1, &(0x7f0000000080), &(0x7f0000ffb000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) 22:38:15 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:15 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) [ 1674.430894] loop1: detected capacity change from 0 to 264192 [ 1674.435622] loop4: detected capacity change from 0 to 264192 [ 1674.437072] loop5: detected capacity change from 0 to 264192 [ 1674.448114] loop0: detected capacity change from 0 to 264192 [ 1674.456668] loop5: detected capacity change from 0 to 256 [ 1674.459479] loop4: detected capacity change from 0 to 256 [ 1674.466223] loop1: detected capacity change from 0 to 256 [ 1674.470918] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1674.478110] loop0: detected capacity change from 0 to 256 [ 1674.483308] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1674.488678] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1674.498860] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1674.549792] loop2: detected capacity change from 0 to 256 22:38:15 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) [ 1674.603723] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:38:15 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:15 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:38:15 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:15 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:15 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:38:15 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x80081280, &(0x7f0000002340)) 22:38:15 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1674.721779] loop0: detected capacity change from 0 to 264192 [ 1674.726754] loop5: detected capacity change from 0 to 264192 [ 1674.747218] loop0: detected capacity change from 0 to 256 [ 1674.750445] loop1: detected capacity change from 0 to 264192 [ 1674.752926] loop5: detected capacity change from 0 to 256 [ 1674.766113] loop4: detected capacity change from 0 to 264192 [ 1674.774517] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1674.779291] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1674.799129] loop1: detected capacity change from 0 to 256 [ 1674.799726] loop4: detected capacity change from 0 to 256 [ 1674.813062] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1674.825978] loop6: detected capacity change from 0 to 264192 [ 1674.833825] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1674.856600] loop6: detected capacity change from 0 to 256 [ 1674.907626] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1674.946469] loop2: detected capacity change from 0 to 256 [ 1674.966945] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:38:30 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:30 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:31 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:31 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x80081280, &(0x7f0000002340)) 22:38:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:31 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:38:31 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x80081280, &(0x7f0000002340)) 22:38:31 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1689.983677] loop5: detected capacity change from 0 to 264192 [ 1689.985093] loop1: detected capacity change from 0 to 264192 [ 1689.987813] loop0: detected capacity change from 0 to 264192 [ 1689.993169] loop4: detected capacity change from 0 to 264192 [ 1689.994924] loop2: detected capacity change from 0 to 256 [ 1690.013686] loop0: detected capacity change from 0 to 256 [ 1690.019991] loop4: detected capacity change from 0 to 256 [ 1690.021190] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1690.021842] loop5: detected capacity change from 0 to 256 [ 1690.027943] loop1: detected capacity change from 0 to 256 [ 1690.034724] loop6: detected capacity change from 0 to 264192 [ 1690.047796] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1690.055299] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1690.063254] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1690.067236] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:38:31 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x80081280, &(0x7f0000002340)) [ 1690.073815] loop6: detected capacity change from 0 to 256 [ 1690.108528] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:38:31 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x80081280, &(0x7f0000002340)) 22:38:31 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, 0x0, 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:31 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:38:31 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:31 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:31 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:38:31 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1690.332932] loop2: detected capacity change from 0 to 256 [ 1690.339421] loop5: detected capacity change from 0 to 264192 [ 1690.361807] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1690.374307] loop5: detected capacity change from 0 to 256 [ 1690.374652] loop0: detected capacity change from 0 to 264192 [ 1690.376538] loop4: detected capacity change from 0 to 264192 [ 1690.378127] loop1: detected capacity change from 0 to 264192 [ 1690.401721] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1690.402028] loop4: detected capacity change from 0 to 256 [ 1690.405068] loop0: detected capacity change from 0 to 256 [ 1690.426009] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1690.431971] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1690.435645] loop1: detected capacity change from 0 to 256 [ 1690.442177] loop6: detected capacity change from 0 to 264192 [ 1690.466358] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1690.469144] loop6: detected capacity change from 0 to 256 [ 1690.493493] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:38:45 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:38:45 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) 22:38:45 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:38:45 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x80081280, &(0x7f0000002340)) 22:38:45 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, 0x0, 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:45 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:38:45 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:45 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1704.653818] loop1: detected capacity change from 0 to 264192 [ 1704.661758] loop0: detected capacity change from 0 to 264192 [ 1704.675246] loop5: detected capacity change from 0 to 264192 [ 1704.681662] loop2: detected capacity change from 0 to 256 [ 1704.698207] loop5: detected capacity change from 0 to 256 [ 1704.706609] loop0: detected capacity change from 0 to 256 [ 1704.711204] loop1: detected capacity change from 0 to 256 [ 1704.713796] loop4: detected capacity change from 0 to 264192 [ 1704.720664] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1704.722444] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1704.741126] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1704.768505] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1704.787681] loop4: detected capacity change from 0 to 256 [ 1704.821444] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:38:45 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:38:45 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x80081280, &(0x7f0000002340)) 22:38:45 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081280, &(0x7f0000002340)) 22:38:45 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:38:46 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:46 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, 0x0, 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:46 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:38:46 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1705.038495] loop0: detected capacity change from 0 to 264192 [ 1705.055246] loop5: detected capacity change from 0 to 264192 [ 1705.059111] loop2: detected capacity change from 0 to 256 [ 1705.072159] loop4: detected capacity change from 0 to 264192 [ 1705.077036] loop0: detected capacity change from 0 to 256 [ 1705.090220] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1705.097942] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1705.101180] loop4: detected capacity change from 0 to 256 22:38:46 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081280, &(0x7f0000002340)) [ 1705.111580] loop5: detected capacity change from 0 to 256 [ 1705.144573] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1705.154964] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:38:59 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081280, &(0x7f0000002340)) 22:38:59 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:38:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:38:59 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') pread64(r5, &(0x7f0000000180)=""/16, 0x2f00, 0x79) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f00000011c0)={{0x2, 0x4e24, @remote}, {0x1, @link_local}, 0x4, {0x2, 0x4e21, @private=0xa010101}, 'veth0_vlan\x00'}) r6 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r6, 0x80081280, &(0x7f0000002340)) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x4a, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, r6, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f0000000100)=0x80) 22:38:59 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x80081280, &(0x7f0000002340)) 22:38:59 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:38:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1718.351679] loop1: detected capacity change from 0 to 264192 [ 1718.386003] loop1: detected capacity change from 0 to 256 [ 1718.394827] loop4: detected capacity change from 0 to 264192 [ 1718.400688] loop0: detected capacity change from 0 to 264192 [ 1718.402797] loop5: detected capacity change from 0 to 264192 [ 1718.411457] loop2: detected capacity change from 0 to 264192 [ 1718.414234] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1718.431098] loop4: detected capacity change from 0 to 256 [ 1718.432585] loop0: detected capacity change from 0 to 256 [ 1718.434288] loop5: detected capacity change from 0 to 256 [ 1718.444934] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1718.455437] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1718.463718] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1718.463797] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1718.471931] loop2: detected capacity change from 0 to 256 22:38:59 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081280, &(0x7f0000002340)) 22:38:59 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r5, 0x80081280, &(0x7f0000002340)) [ 1718.515484] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:38:59 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:38:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1718.722796] loop0: detected capacity change from 0 to 264192 [ 1718.740512] loop0: detected capacity change from 0 to 256 [ 1718.751555] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:14 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:14 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:14 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:39:14 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1733.797468] loop1: detected capacity change from 0 to 264192 22:39:14 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:39:14 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x80081280, &(0x7f0000002340)) 22:39:14 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081280, &(0x7f0000002340)) 22:39:14 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1733.818153] loop2: detected capacity change from 0 to 264192 [ 1733.821196] loop1: detected capacity change from 0 to 256 [ 1733.826629] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1733.832846] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1733.835705] loop2: detected capacity change from 0 to 256 [ 1733.841456] loop6: detected capacity change from 0 to 264192 [ 1733.843390] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1733.873856] loop5: detected capacity change from 0 to 264192 [ 1733.875211] loop0: detected capacity change from 0 to 264192 [ 1733.885817] loop6: detected capacity change from 0 to 256 [ 1733.888281] loop4: detected capacity change from 0 to 264192 [ 1733.894866] loop5: detected capacity change from 0 to 256 [ 1733.902941] loop0: detected capacity change from 0 to 256 [ 1733.908054] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:15 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1733.919158] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1733.926534] loop4: detected capacity change from 0 to 256 [ 1733.948961] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:15 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1733.963231] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:15 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x80081280, &(0x7f0000002340)) 22:39:15 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(0xffffffffffffffff, &(0x7f0000000080)="01", 0x41030) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081280, &(0x7f0000002340)) 22:39:15 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1734.048646] loop1: detected capacity change from 0 to 264192 [ 1734.056501] loop2: detected capacity change from 0 to 264192 [ 1734.063346] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1734.084605] loop2: detected capacity change from 0 to 256 [ 1734.109621] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:15 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r6 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) ftruncate(r1, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) 22:39:15 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:15 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1734.175388] loop4: detected capacity change from 0 to 264192 [ 1734.197768] loop4: detected capacity change from 0 to 256 [ 1734.208638] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1734.214033] loop5: detected capacity change from 0 to 264192 [ 1734.223097] loop6: detected capacity change from 0 to 264192 [ 1734.235609] loop6: detected capacity change from 0 to 256 [ 1734.243778] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1734.244849] loop5: detected capacity change from 0 to 256 [ 1734.247819] loop0: detected capacity change from 0 to 264192 [ 1734.258483] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1734.266807] loop0: detected capacity change from 0 to 256 [ 1734.286977] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:27 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:39:27 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:27 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:39:27 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081280, &(0x7f0000002340)) 22:39:27 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:27 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:27 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:27 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x406, r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x80081280, &(0x7f0000002340)) [ 1746.258962] loop4: detected capacity change from 0 to 264192 [ 1746.259912] loop1: detected capacity change from 0 to 264192 [ 1746.262207] loop5: detected capacity change from 0 to 264192 [ 1746.265024] loop0: detected capacity change from 0 to 264192 [ 1746.265237] loop2: detected capacity change from 0 to 264192 [ 1746.277785] loop4: detected capacity change from 0 to 256 [ 1746.279900] loop1: detected capacity change from 0 to 256 [ 1746.281911] loop5: detected capacity change from 0 to 256 [ 1746.291273] loop0: detected capacity change from 0 to 256 [ 1746.297873] loop6: detected capacity change from 0 to 264192 [ 1746.303239] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1746.305071] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1746.306487] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1746.318758] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:27 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) r4 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x80081280, &(0x7f0000002340)) [ 1746.331469] loop6: detected capacity change from 0 to 256 22:39:27 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1746.372801] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:27 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) 22:39:27 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000000000", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:27 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:39:27 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:39:27 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1746.453941] loop5: detected capacity change from 0 to 264192 [ 1746.455889] loop2: detected capacity change from 0 to 264192 [ 1746.457299] loop4: detected capacity change from 0 to 264192 [ 1746.478822] loop5: detected capacity change from 0 to 256 22:39:27 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x80081280, &(0x7f0000002340)) [ 1746.489592] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:27 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1746.560685] loop1: detected capacity change from 0 to 264192 [ 1746.582194] loop1: detected capacity change from 0 to 256 [ 1746.591072] loop0: detected capacity change from 0 to 264192 [ 1746.597520] loop6: detected capacity change from 0 to 264192 [ 1746.607109] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1746.612110] loop6: detected capacity change from 0 to 256 [ 1746.617256] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1746.623859] loop0: detected capacity change from 0 to 256 [ 1746.641238] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:39 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000000000", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:39:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) 22:39:39 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:39:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0x9, 0x1f, 0x0, 0x10, 0x0, 0x5, 0xc20, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0xffff, 0x5102}, 0x400, 0x598, 0x400, 0x1, 0x20, 0x6, 0x7fff, 0x0, 0x6, 0x0, 0x6}, 0x0, 0xf, r2, 0xb) r3 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x80081280, &(0x7f0000002340)) 22:39:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r5 = pidfd_getfd(r4, r4, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r5, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r6 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r4, {r6}}, './file0\x00'}) ftruncate(r1, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) [ 1758.422969] loop4: detected capacity change from 0 to 264192 [ 1758.424195] loop2: detected capacity change from 0 to 264192 [ 1758.425783] loop5: detected capacity change from 0 to 264192 [ 1758.434212] loop0: detected capacity change from 0 to 264192 [ 1758.439513] loop4: detected capacity change from 0 to 256 [ 1758.442832] loop0: detected capacity change from 0 to 256 [ 1758.443209] loop1: detected capacity change from 0 to 264192 [ 1758.447139] loop5: detected capacity change from 0 to 256 [ 1758.456208] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1758.458627] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1758.461938] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1758.472079] loop1: detected capacity change from 0 to 256 [ 1758.491855] loop6: detected capacity change from 0 to 264192 [ 1758.499605] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:39 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:39 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b0"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:39 executing program 7: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) 22:39:39 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f0000000000000000", @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1758.547449] loop6: detected capacity change from 0 to 256 22:39:39 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x406, r0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x80081280, &(0x7f0000002340)) 22:39:39 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1758.580490] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1758.609016] loop2: detected capacity change from 0 to 264192 [ 1758.613237] loop5: detected capacity change from 0 to 264192 [ 1758.614108] loop0: detected capacity change from 0 to 264192 [ 1758.616746] loop4: detected capacity change from 0 to 264192 [ 1758.622701] loop2: detected capacity change from 0 to 256 22:39:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) [ 1758.629597] loop0: detected capacity change from 0 to 256 [ 1758.636942] loop5: detected capacity change from 0 to 256 [ 1758.637469] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1758.637517] Buffer I/O error on dev loop4, logical block 0, async page read [ 1758.637589] loop4: unable to read partition table [ 1758.637752] loop4: partition table beyond EOD, truncated [ 1758.642840] loop4: detected capacity change from 0 to 256 [ 1758.647546] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1758.656246] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1758.658743] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1758.660838] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1758.761397] loop1: detected capacity change from 0 to 264192 [ 1758.779235] loop1: detected capacity change from 0 to 256 [ 1758.786043] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:52 executing program 7: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) 22:39:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:39:52 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b0"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) (fail_nth: 1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, 0x0) 22:39:52 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/192, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) 22:39:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 1771.003465] FAULT_INJECTION: forcing a failure. [ 1771.003465] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1771.004450] CPU: 0 PID: 8864 Comm: syz-executor.6 Not tainted 6.0.0-rc1-next-20220818 #1 [ 1771.005061] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1521 [ 1771.005714] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 8864, name: syz-executor.6 [ 1771.006367] preempt_count: 0, expected: 0 [ 1771.006685] RCU nest depth: 0, expected: 0 [ 1771.007008] no locks held by syz-executor.6/8864. [ 1771.007375] irq event stamp: 720 [ 1771.007641] hardirqs last enabled at (719): [] __up_console_sem+0x78/0x80 [ 1771.008313] hardirqs last disabled at (720): [] dump_stack_lvl+0x2e/0xb3 [ 1771.008958] softirqs last enabled at (672): [] __irq_exit_rcu+0x11b/0x180 [ 1771.009623] softirqs last disabled at (647): [] __irq_exit_rcu+0x11b/0x180 [ 1771.010258] CPU: 0 PID: 8864 Comm: syz-executor.6 Not tainted 6.0.0-rc1-next-20220818 #1 22:39:52 executing program 7: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) [ 1771.026535] syz-executor.6[8864] cmdline: /syz-executor.6 exec [ 1771.027015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1771.028017] Call Trace: [ 1771.028230] [ 1771.028493] dump_stack_lvl+0x8b/0xb3 [ 1771.028811] __might_resched.cold+0x222/0x26b [ 1771.029172] down_read_killable+0x75/0x490 [ 1771.029602] ? down_read_interruptible+0x490/0x490 [ 1771.029998] __access_remote_vm+0xac/0x6f0 [ 1771.030421] ? follow_phys+0x2c0/0x2c0 [ 1771.030740] ? do_raw_spin_lock+0x121/0x260 [ 1771.031086] ? rwlock_bug.part.0+0x90/0x90 [ 1771.031507] ? lock_release+0x3b2/0x750 [ 1771.031830] ? __up_console_sem+0x47/0x80 [ 1771.032166] get_mm_cmdline.part.0+0x214/0x600 [ 1771.032608] ? dname_to_vma_addr.isra.0+0x360/0x360 [ 1771.033001] ? _raw_spin_unlock_irqrestore+0x33/0x60 [ 1771.033493] get_task_cmdline_kernel+0x1e9/0x230 [ 1771.033869] dump_stack_print_cmdline.part.0+0x82/0x150 [ 1771.034284] ? _atomic_dec_and_lock_irqsave+0x150/0x150 [ 1771.034781] ? __wake_up_klogd.part.0+0xc5/0xf0 [ 1771.035184] ? dump_stack_print_info+0xc6/0x190 [ 1771.035631] dump_stack_print_info+0x185/0x190 [ 1771.036002] dump_stack_lvl+0x7f/0xb3 [ 1771.036305] should_fail.cold+0x5/0xa [ 1771.036699] _copy_from_user+0x2a/0x170 [ 1771.037017] iovec_from_user+0x23a/0x3c0 [ 1771.037530] __import_iovec+0x64/0x600 [ 1771.037847] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1771.038260] import_iovec+0x83/0xb0 [ 1771.038643] vfs_writev+0xc1/0x630 [ 1771.038930] ? vfs_iter_write+0xa0/0xa0 [ 1771.039246] ? lock_release+0x3b2/0x750 [ 1771.039638] ? __fget_files+0x24e/0x450 [ 1771.039952] ? lock_downgrade+0x6d0/0x6d0 [ 1771.040281] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 1771.040754] ? syscall_enter_from_user_mode+0x18/0x50 [ 1771.041152] ? __fget_files+0x270/0x450 [ 1771.041578] __x64_sys_pwritev+0x22f/0x310 [ 1771.041922] ? __x64_sys_pwritev2+0x150/0x150 [ 1771.042273] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.042751] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.043158] do_syscall_64+0x3b/0x90 [ 1771.043543] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1771.043952] RIP: 0033:0x7eff86dd4b19 [ 1771.044243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1771.045698] RSP: 002b:00007eff8434a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1771.046286] RAX: ffffffffffffffda RBX: 00007eff86ee7f60 RCX: 00007eff86dd4b19 [ 1771.046908] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000006 [ 1771.047526] RBP: 00007eff8434a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1771.048066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1771.048681] R13: 00007fffd7e3728f R14: 00007eff8434a300 R15: 0000000000022000 [ 1771.049235] [ 1771.055662] loop2: detected capacity change from 0 to 264192 [ 1771.062803] loop2: detected capacity change from 0 to 256 [ 1771.064137] loop1: detected capacity change from 0 to 264192 [ 1771.068229] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) [ 1771.109507] loop0: detected capacity change from 0 to 264192 [ 1771.113777] loop1: detected capacity change from 0 to 256 [ 1771.117159] loop5: detected capacity change from 0 to 264192 [ 1771.120109] syz-executor.6[8864] cmdline: /syz-executor.6 exec [ 1771.120853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1771.121043] loop4: detected capacity change from 0 to 264192 [ 1771.121774] Call Trace: [ 1771.122927] [ 1771.123113] dump_stack_lvl+0x8b/0xb3 [ 1771.123513] should_fail.cold+0x5/0xa [ 1771.123827] _copy_from_user+0x2a/0x170 [ 1771.124156] iovec_from_user+0x23a/0x3c0 [ 1771.124577] __import_iovec+0x64/0x600 [ 1771.124895] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1771.125398] import_iovec+0x83/0xb0 [ 1771.125714] vfs_writev+0xc1/0x630 [ 1771.126016] ? vfs_iter_write+0xa0/0xa0 [ 1771.126418] ? lock_release+0x3b2/0x750 [ 1771.126749] ? __fget_files+0x24e/0x450 [ 1771.127080] ? lock_downgrade+0x6d0/0x6d0 [ 1771.127502] ? perf_trace_run_bpf_submit+0xf5/0x1d0 [ 1771.127915] ? syscall_enter_from_user_mode+0x18/0x50 [ 1771.128405] ? __fget_files+0x270/0x450 [ 1771.128742] __x64_sys_pwritev+0x22f/0x310 [ 1771.129076] ? __x64_sys_pwritev2+0x150/0x150 [ 1771.129524] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.129942] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.130431] do_syscall_64+0x3b/0x90 [ 1771.130736] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1771.131141] RIP: 0033:0x7eff86dd4b19 [ 1771.131509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1771.132949] RSP: 002b:00007eff8434a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1771.133632] RAX: ffffffffffffffda RBX: 00007eff86ee7f60 RCX: 00007eff86dd4b19 [ 1771.134177] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000006 [ 1771.134796] RBP: 00007eff8434a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1771.135337] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1771.136000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1771.136013] R13: 00007fffd7e3728f R14: 00007eff8434a300 R15: 0000000000022000 [ 1771.136039] 22:39:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1771.157002] loop5: detected capacity change from 0 to 256 [ 1771.158911] loop4: detected capacity change from 0 to 256 [ 1771.161043] loop0: detected capacity change from 0 to 256 22:39:52 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) [ 1771.191539] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1771.195749] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1771.202145] loop2: detected capacity change from 0 to 264192 [ 1771.203053] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1771.214603] loop2: detected capacity change from 0 to 256 22:39:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) [ 1771.223847] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:39:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) (fail_nth: 2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xf3, 0x8, 0x3f, 0x40, 0x0, 0x5, 0x8000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x2, @perf_bp={0x0, 0x2}, 0x490a, 0x0, 0x9, 0x0, 0x3f, 0x0, 0xede, 0x0, 0xffffffc1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001180)='numa_maps\x00') getpeername(0xffffffffffffffff, &(0x7f0000000180)=@xdp, 0x0) 22:39:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r2) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r3 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 22:39:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) pidfd_getfd(r4, r4, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1771.316832] FAULT_INJECTION: forcing a failure. [ 1771.316832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1771.317947] CPU: 0 PID: 8885 Comm: syz-executor.6 Tainted: G W 6.0.0-rc1-next-20220818 #1 [ 1771.324939] syz-executor.6[8885] cmdline: /syz-executor.6 exec [ 1771.325500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1771.326458] Call Trace: [ 1771.326670] [ 1771.326857] dump_stack_lvl+0x8b/0xb3 [ 1771.327170] should_fail.cold+0x5/0xa [ 1771.327559] _copy_from_user+0x2a/0x170 [ 1771.327891] clear_refs_write+0xcc/0x800 [ 1771.328219] ? show_smaps_rollup+0x9b0/0x9b0 [ 1771.328652] ? inode_security+0x105/0x140 [ 1771.328985] ? avc_policy_seqno+0x9/0x70 [ 1771.329404] ? selinux_file_permission+0x36/0x510 [ 1771.329797] ? security_file_permission+0xb1/0xe0 [ 1771.330188] do_iter_write+0x4e7/0x700 [ 1771.330596] vfs_writev+0x1ae/0x630 [ 1771.330896] ? vfs_iter_write+0xa0/0xa0 [ 1771.331214] ? lock_release+0x3b2/0x750 [ 1771.331616] ? __fget_files+0x24e/0x450 [ 1771.331946] ? syscall_enter_from_user_mode+0x18/0x50 [ 1771.332438] ? __fget_files+0x270/0x450 [ 1771.332778] __x64_sys_pwritev+0x22f/0x310 [ 1771.333116] ? __x64_sys_pwritev2+0x150/0x150 [ 1771.333579] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.333982] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1771.334461] do_syscall_64+0x3b/0x90 [ 1771.334773] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1771.335179] RIP: 0033:0x7eff86dd4b19 [ 1771.335553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1771.336997] RSP: 002b:00007eff8434a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 1771.337669] RAX: ffffffffffffffda RBX: 00007eff86ee7f60 RCX: 00007eff86dd4b19 [ 1771.338208] RDX: 0000000000000001 RSI: 0000000020000000 RDI: 0000000000000006 [ 1771.338833] RBP: 00007eff8434a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1771.339446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1771.339993] R13: 00007fffd7e3728f R14: 00007eff8434a300 R15: 0000000000022000 [ 1771.340621] 22:39:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b0"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) 22:39:52 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x44b43, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x80081280, &(0x7f0000002340)) 22:39:52 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_genetlink_get_family_id$ethtool(0x0, r3) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/192, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b074f7db17ca"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r5 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r5}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) 22:39:52 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)='3', 0x1}], 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000200)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syncfs(r0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000840)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="1f000050c70000001000000000000000337a249589446119234e9ddd925585279dce67dae0e05be228b981870537cd6d22a1ad208f69421c07a92e635ab39565211b710126ee622109f6e384e9842b8280650112"]) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000, 0x108) r4 = pidfd_getfd(r3, r3, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r4, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0070dbdf256a000073bf86ff00006b98ae6b374bd2e03a3974c4be681eced082a5507e373cd1e2af6e607de0b4bc1dc1444b81dd6afa36665f0ee1c04a5f02c52792088e582c6144ba464d74fa7e69f14a742f59266c2e8627fa0a46dc2fa76503b4d213bf8425a36f02059987989549d42ef2dc9682d44c10729d1cf2c8653876e1150a467a97c2a900da8acdd1b52d85e0d35687158ead2d96e7f22d0a92ac5b866cd4eb598ef5da5b8e3304a66d2343b1827a6c9f00"/193, @ANYRES32=0x0, @ANYBLOB="0c00990006000005000000b9792d05b0"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000680)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC=0x0, @ANYRES64, @ANYBLOB=',smackfsdef=vfat\x00,pcr=00000000000000000025,\x00']) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) close(0xffffffffffffffff) [ 1771.418932] loop2: detected capacity change from 0 to 264192 [ 1771.420900] loop0: detected capacity change from 0 to 264192 [ 1771.422282] loop4: detected capacity change from 0 to 264192 [ 1771.432635] loop0: detected capacity change from 0 to 256 [ 1771.433793] loop4: detected capacity change from 0 to 256 [ 1771.441257] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1771.442114] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1771.444639] loop5: detected capacity change from 0 to 264192 [ 1771.449180] loop1: detected capacity change from 0 to 264192 [ 1771.464054] loop2: detected capacity change from 0 to 256 [ 1771.469785] loop5: detected capacity change from 0 to 256 [ 1771.472126] loop1: detected capacity change from 0 to 256 [ 1771.489086] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1771.492849] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 1771.494936] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) VM DIAGNOSIS: 22:39:52 Registers: info registers vcpu 0 RAX=0000000080000002 RBX=800000003512e007 RCX=ffffffff816a0a7d RDX=0000000000000001 RSI=0000000000000000 RDI=0000000000000005 RBP=ffff88803b88f940 RSP=ffff88803b497800 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000001 R13=dffffc0000000000 R14=ffff88800d55c240 R15=0000000000000000 RIP=ffffffff81459d30 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00005555561cc400 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555556fe8708 CR3=000000000ec7c000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=00000000000000a9 RCX=0000000000000000 RDX=ffff88800fe70000 RSI=00000000000000a9 RDI=0000000000000006 RBP=0000000000000029 RSP=ffff88804411fbc0 R8 =0000000000000006 R9 =0000000000000029 R10=0000000000000029 R11=0000000000000001 R12=ffff88801dccf440 R13=0000000000000029 R14=00000000000000b0 R15=dffffc0000000000 RIP=ffffffff815b1e0b RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556fe8400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f06c0dbcad0 CR3=000000001ad8a000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000