&(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:55:24 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2383.960206] loop6: detected capacity change from 0 to 76800 [ 2383.970630] FAT-fs (loop6): bogus number of reserved sectors [ 2383.971047] FAT-fs (loop6): Can't find a valid FAT filesystem 22:55:24 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2384.016991] loop5: detected capacity change from 0 to 264192 22:55:24 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c4227930", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:55:24 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB, @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2384.047291] loop4: detected capacity change from 0 to 256 [ 2384.051803] loop5: detected capacity change from 0 to 256 22:55:24 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2384.099424] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:55:24 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2384.114725] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2384.128795] loop7: detected capacity change from 0 to 264192 [ 2384.148116] loop7: detected capacity change from 0 to 256 [ 2384.160945] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:55:39 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:55:39 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:55:39 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:55:39 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:55:39 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1db", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:55:39 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:55:39 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:55:39 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2399.256719] loop7: detected capacity change from 0 to 264192 [ 2399.273662] loop4: detected capacity change from 0 to 256 [ 2399.280369] loop7: detected capacity change from 0 to 256 [ 2399.285694] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2399.286852] loop6: detected capacity change from 0 to 76800 [ 2399.290770] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2399.295123] FAT-fs (loop6): bogus number of reserved sectors [ 2399.295604] FAT-fs (loop6): Can't find a valid FAT filesystem 22:55:39 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2399.329859] loop5: detected capacity change from 0 to 264192 [ 2399.351188] loop5: detected capacity change from 0 to 256 22:55:39 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:55:39 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2399.380380] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:55:39 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1db", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2399.434965] loop4: detected capacity change from 0 to 256 [ 2399.442855] loop7: detected capacity change from 0 to 264192 [ 2399.447753] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:55:52 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1db", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:55:52 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:55:52 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x18, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:55:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:55:52 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 22:55:52 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:55:52 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:55:52 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2412.616291] loop6: detected capacity change from 0 to 76800 [ 2412.622445] FAT-fs (loop6): bogus number of reserved sectors [ 2412.622929] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2412.628781] loop4: detected capacity change from 0 to 256 [ 2412.639788] loop7: detected capacity change from 0 to 264192 [ 2412.643281] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2412.651773] loop5: detected capacity change from 0 to 264192 [ 2412.655031] loop7: detected capacity change from 0 to 256 [ 2412.665695] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2412.707467] loop5: detected capacity change from 0 to 256 22:55:52 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x18, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:55:52 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) [ 2412.750020] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:55:52 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) 22:55:53 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb4", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:55:53 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2412.813103] loop4: detected capacity change from 0 to 256 [ 2412.844881] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:55:53 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:55:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) epoll_create(0x3) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:55:53 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2412.931383] loop7: detected capacity change from 0 to 264192 22:55:53 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:55:53 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2412.966330] loop6: detected capacity change from 0 to 76800 [ 2412.971375] FAT-fs (loop6): bogus number of reserved sectors [ 2412.971969] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2412.972248] loop7: detected capacity change from 0 to 256 [ 2412.986444] loop5: detected capacity change from 0 to 264192 [ 2412.999089] loop5: detected capacity change from 0 to 256 [ 2413.009423] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2413.010225] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:06 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb4", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:06 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:06 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:06 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r3 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r4 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r4, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:06 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x18, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:07 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:07 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:07 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2426.820177] loop7: detected capacity change from 0 to 264192 [ 2426.835941] loop6: detected capacity change from 0 to 76800 [ 2426.843771] loop5: detected capacity change from 0 to 264192 [ 2426.849452] FAT-fs (loop6): bogus number of reserved sectors [ 2426.850302] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2426.854265] loop4: detected capacity change from 0 to 256 [ 2426.866985] loop7: detected capacity change from 0 to 256 [ 2426.875101] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2426.880824] loop5: detected capacity change from 0 to 256 [ 2426.887342] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:07 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2426.914624] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:07 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:07 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:07 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r3 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r4 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r4, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:07 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:07 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2427.091391] loop6: detected capacity change from 0 to 76800 22:56:07 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:07 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb4", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2427.120779] FAT-fs (loop6): bogus number of reserved sectors [ 2427.121652] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2427.152043] loop5: detected capacity change from 0 to 264192 [ 2427.166898] loop5: detected capacity change from 0 to 256 22:56:07 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:07 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2427.180771] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2427.186961] loop4: detected capacity change from 0 to 256 [ 2427.222682] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:07 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r3 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r4 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r4, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:07 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:07 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:07 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:07 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2427.337530] loop5: detected capacity change from 0 to 264192 [ 2427.349829] loop5: detected capacity change from 0 to 256 [ 2427.357065] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:23 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:23 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:23 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f31614000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:23 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:23 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:23 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:23 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:23 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2443.802350] loop6: detected capacity change from 0 to 76800 [ 2443.806465] loop4: detected capacity change from 0 to 256 [ 2443.809068] loop5: detected capacity change from 0 to 264192 [ 2443.810122] loop7: detected capacity change from 0 to 264192 [ 2443.827421] FAT-fs (loop6): bogus number of reserved sectors [ 2443.828571] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2443.842250] loop7: detected capacity change from 0 to 256 [ 2443.845144] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2443.847791] loop5: detected capacity change from 0 to 256 [ 2443.864399] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2443.874946] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:24 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:24 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2444.064049] loop4: detected capacity change from 0 to 256 [ 2444.071426] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2460.544824] loop6: detected capacity change from 0 to 76800 [ 2460.548613] loop4: detected capacity change from 0 to 256 [ 2460.562289] FAT-fs (loop6): bogus number of reserved sectors [ 2460.562805] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2460.566065] loop7: detected capacity change from 0 to 264192 [ 2460.566817] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2460.572240] loop5: detected capacity change from 0 to 264192 22:56:40 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f31614000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:40 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:40 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:40 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:40 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:40 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:40 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:40 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2460.586447] loop7: detected capacity change from 0 to 256 [ 2460.587962] loop5: detected capacity change from 0 to 256 [ 2460.594648] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2460.604804] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:40 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:40 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2460.700922] loop4: detected capacity change from 0 to 256 [ 2460.711405] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:40 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f3161400000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2460.723944] loop7: detected capacity change from 0 to 264192 [ 2460.737301] loop7: detected capacity change from 0 to 256 [ 2460.742234] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:41 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:41 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:41 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2460.845756] loop5: detected capacity change from 0 to 264192 [ 2460.869330] loop5: detected capacity change from 0 to 256 [ 2460.891072] loop4: detected capacity change from 0 to 256 [ 2460.894829] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2460.918578] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:54 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:54 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:54 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x0) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:54 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:54 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x30, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:54 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2474.374887] loop4: detected capacity change from 0 to 256 [ 2474.388311] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2474.409696] loop7: detected capacity change from 0 to 264192 [ 2474.415108] loop6: detected capacity change from 0 to 76800 [ 2474.437176] FAT-fs (loop6): bogus number of reserved sectors [ 2474.437673] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2474.439180] loop5: detected capacity change from 0 to 264192 [ 2474.444559] loop7: detected capacity change from 0 to 256 [ 2474.456860] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2474.457313] loop5: detected capacity change from 0 to 256 [ 2474.470048] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:54 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x30, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:56:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:54 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:54 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2474.606260] loop6: detected capacity change from 0 to 76800 [ 2474.614436] FAT-fs (loop6): bogus number of reserved sectors [ 2474.614971] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2474.629325] loop4: detected capacity change from 0 to 256 22:56:54 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2474.659713] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:56:54 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:56:54 executing program 3: unlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:56:54 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2474.725171] loop5: detected capacity change from 0 to 264192 22:56:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2474.751823] loop7: detected capacity change from 0 to 264192 [ 2474.761456] loop6: detected capacity change from 0 to 76800 [ 2474.770007] FAT-fs (loop6): bogus number of reserved sectors [ 2474.770634] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2474.777090] loop5: detected capacity change from 0 to 256 [ 2474.810097] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:08 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:08 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:08 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:08 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:08 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:08 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, 0x0, 0x0, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:08 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2487.939267] loop7: detected capacity change from 0 to 264192 22:57:08 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x30, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2487.954348] loop6: detected capacity change from 0 to 76800 [ 2487.961242] loop5: detected capacity change from 0 to 264192 [ 2487.965761] FAT-fs (loop6): bogus number of reserved sectors [ 2487.966343] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2487.976754] loop5: detected capacity change from 0 to 256 [ 2487.984082] loop7: detected capacity change from 0 to 256 [ 2487.987275] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2488.005037] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:08 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2488.014865] loop4: detected capacity change from 0 to 256 [ 2488.028422] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:08 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:08 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2488.126180] loop5: detected capacity change from 0 to 264192 [ 2488.134456] loop5: detected capacity change from 0 to 256 [ 2488.140799] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:08 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:08 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:08 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:08 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:57:08 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2488.267143] loop6: detected capacity change from 0 to 76800 [ 2488.287096] FAT-fs (loop6): bogus number of reserved sectors [ 2488.287286] loop4: detected capacity change from 0 to 256 [ 2488.287707] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2488.291858] loop5: detected capacity change from 0 to 264192 [ 2488.303777] loop5: detected capacity change from 0 to 256 [ 2488.306302] loop7: detected capacity change from 0 to 264192 [ 2488.310996] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2488.329941] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2488.331996] loop7: detected capacity change from 0 to 256 [ 2488.350834] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:23 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:23 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, 0x0, 0x0, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2503.312516] loop7: detected capacity change from 0 to 264192 22:57:23 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:23 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:23 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:23 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:23 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:57:23 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2503.333022] loop6: detected capacity change from 0 to 76800 [ 2503.343924] loop7: detected capacity change from 0 to 256 [ 2503.346850] FAT-fs (loop6): bogus number of reserved sectors [ 2503.347303] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2503.357036] loop5: detected capacity change from 0 to 264192 [ 2503.359780] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2503.387106] loop5: detected capacity change from 0 to 256 [ 2503.391101] loop4: detected capacity change from 0 to 256 22:57:23 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2503.414831] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2503.419729] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:23 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2503.505586] loop7: detected capacity change from 0 to 264192 22:57:36 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:36 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:36 executing program 1: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:57:36 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x2c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:36 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:57:36 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:36 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, 0x0, 0x0, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2516.693240] loop6: detected capacity change from 0 to 76800 [ 2516.697134] FAT-fs (loop6): bogus number of reserved sectors [ 2516.697625] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2516.700670] loop5: detected capacity change from 0 to 264192 [ 2516.709933] loop5: detected capacity change from 0 to 256 [ 2516.715045] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2516.726391] loop4: detected capacity change from 0 to 256 22:57:36 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2516.743654] loop7: detected capacity change from 0 to 264192 [ 2516.749290] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2516.757156] loop7: detected capacity change from 0 to 256 [ 2516.773159] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:37 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:37 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:37 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2516.874780] loop5: detected capacity change from 0 to 264192 22:57:37 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080), 0x0, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:37 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2516.928875] loop5: detected capacity change from 0 to 256 22:57:37 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f3161400", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2516.954861] loop4: detected capacity change from 0 to 256 [ 2516.956717] loop6: detected capacity change from 0 to 76800 22:57:37 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2516.962824] FAT-fs (loop6): bogus number of reserved sectors [ 2516.963279] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2516.967050] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:37 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2516.985896] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2517.055066] loop7: detected capacity change from 0 to 264192 [ 2517.091930] loop7: detected capacity change from 0 to 256 [ 2517.099198] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:53 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:53 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:53 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:57:53 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:53 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:53 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080), 0x0, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:53 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:53 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2533.556213] loop7: detected capacity change from 0 to 264192 [ 2533.605030] loop6: detected capacity change from 0 to 76800 [ 2533.609705] loop7: detected capacity change from 0 to 256 [ 2533.617927] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2533.618331] loop4: detected capacity change from 0 to 256 [ 2533.622047] FAT-fs (loop6): bogus number of reserved sectors [ 2533.622532] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2533.630224] loop5: detected capacity change from 0 to 264192 [ 2533.670763] loop5: detected capacity change from 0 to 256 [ 2533.679604] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:53 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2533.712899] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:53 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:53 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2533.778765] loop6: detected capacity change from 0 to 76800 [ 2533.790829] FAT-fs (loop6): bogus number of reserved sectors [ 2533.791267] FAT-fs (loop6): Can't find a valid FAT filesystem 22:57:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080), 0x0, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:54 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:57:54 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:54 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:54 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:57:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2533.931257] loop4: detected capacity change from 0 to 256 [ 2533.936996] loop5: detected capacity change from 0 to 264192 [ 2533.946833] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2533.949662] loop5: detected capacity change from 0 to 256 [ 2533.949959] loop7: detected capacity change from 0 to 264192 [ 2533.961157] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2533.976080] loop7: detected capacity change from 0 to 256 22:57:54 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2534.002811] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:57:54 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:58:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) epoll_create(0x3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:10 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x30, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:10 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{0x0}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:10 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:10 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:10 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:58:10 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:10 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2550.033059] loop5: detected capacity change from 0 to 264192 [ 2550.038824] loop4: detected capacity change from 0 to 256 [ 2550.051693] loop5: detected capacity change from 0 to 256 [ 2550.058067] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2550.065737] loop7: detected capacity change from 0 to 264192 [ 2550.075189] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2550.079240] loop7: detected capacity change from 0 to 256 [ 2550.095146] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:58:10 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r3 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r4 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r4, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:10 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:10 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,me', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:10 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2550.181468] loop6: detected capacity change from 0 to 76800 [ 2550.184708] FAT-fs (loop6): bogus number of reserved sectors [ 2550.185164] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2550.193077] loop5: detected capacity change from 0 to 264192 22:58:31 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:58:31 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f3161400000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:31 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:31 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x30, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:31 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{0x0}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2571.106050] loop6: detected capacity change from 0 to 76800 22:58:31 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r3 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r4 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r4, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:31 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,me', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2571.127355] loop4: detected capacity change from 0 to 256 [ 2571.149317] loop7: detected capacity change from 0 to 264192 [ 2571.157299] FAT-fs (loop6): bogus number of reserved sectors [ 2571.158191] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2571.167919] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:58:31 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2571.197572] loop5: detected capacity change from 0 to 264192 [ 2571.202194] loop7: detected capacity change from 0 to 256 [ 2571.230050] loop5: detected capacity change from 0 to 256 [ 2571.243730] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:58:31 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2571.270464] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:58:31 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r3 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r3}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r4 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r4, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:31 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x30, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x18, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:31 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:31 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f3161400000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:31 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,me', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2571.493806] loop4: detected capacity change from 0 to 256 [ 2571.508727] loop6: detected capacity change from 0 to 76800 22:58:31 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:31 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{0x0}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2571.519175] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2571.542862] FAT-fs (loop6): bogus number of reserved sectors [ 2571.544023] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2571.549691] loop7: detected capacity change from 0 to 264192 22:58:31 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2571.566655] loop5: detected capacity change from 0 to 264192 [ 2571.571943] loop7: detected capacity change from 0 to 256 [ 2571.594801] loop5: detected capacity change from 0 to 256 [ 2571.600891] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2571.620985] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:58:47 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:58:47 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,me', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:47 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:47 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:47 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x30, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:47 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:47 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcon', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:47 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f3161400000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2587.675854] loop6: detected capacity change from 0 to 76800 22:58:47 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2587.713882] FAT-fs (loop6): bogus number of reserved sectors [ 2587.714387] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2587.722400] loop7: detected capacity change from 0 to 264192 [ 2587.723227] loop5: detected capacity change from 0 to 264192 [ 2587.727142] loop4: detected capacity change from 0 to 256 [ 2587.738427] loop7: detected capacity change from 0 to 256 [ 2587.753133] loop5: detected capacity change from 0 to 256 [ 2587.756250] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2587.759291] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2587.773465] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:58:48 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcon', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:48 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x30, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:58:48 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2587.877620] loop4: detected capacity change from 0 to 256 [ 2587.879037] loop5: detected capacity change from 0 to 264192 [ 2587.889018] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2587.893838] loop5: detected capacity change from 0 to 256 [ 2587.907194] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:58:48 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) epoll_create(0x3) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:58:48 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:58:48 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2587.960760] loop6: detected capacity change from 0 to 76800 22:58:48 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2587.976581] FAT-fs (loop6): bogus number of reserved sectors [ 2587.977403] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2588.016194] loop7: detected capacity change from 0 to 264192 [ 2588.030788] loop7: detected capacity change from 0 to 256 [ 2588.038465] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) epoll_create(0x3) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:05 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x0, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2605.310387] loop6: detected capacity change from 0 to 76800 22:59:05 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:05 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcon', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:05 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x30, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:05 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:05 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2605.318299] FAT-fs (loop6): bogus number of reserved sectors [ 2605.318829] FAT-fs (loop6): Can't find a valid FAT filesystem 22:59:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:05 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2605.396946] loop7: detected capacity change from 0 to 264192 [ 2605.400112] loop5: detected capacity change from 0 to 264192 [ 2605.409940] loop4: detected capacity change from 0 to 256 [ 2605.428314] loop5: detected capacity change from 0 to 256 22:59:05 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, 0x0) fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2605.444016] loop7: detected capacity change from 0 to 256 [ 2605.454541] loop6: detected capacity change from 0 to 76800 [ 2605.456966] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2605.461036] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2605.464894] FAT-fs (loop6): bogus number of reserved sectors [ 2605.465325] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2605.467947] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:05 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:59:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) epoll_create(0x3) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:05 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}}, 0x20000000) 22:59:05 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfine', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:05 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:05 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2605.701297] loop7: detected capacity change from 0 to 264192 [ 2605.711751] loop7: detected capacity change from 0 to 256 [ 2605.719162] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2605.734119] loop5: detected capacity change from 0 to 264192 [ 2605.764113] loop4: detected capacity change from 0 to 256 [ 2605.772719] loop5: detected capacity change from 0 to 256 [ 2605.776622] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2605.794173] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:19 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:19 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:19 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}}, 0x20000000) 22:59:19 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) r7 = epoll_create(0x3) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff], 0x5) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:19 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:19 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfine', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:19 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:59:19 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, 0x0) fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2619.576103] loop5: detected capacity change from 0 to 264192 [ 2619.579169] loop6: detected capacity change from 0 to 76800 [ 2619.583524] FAT-fs (loop6): bogus number of reserved sectors [ 2619.584003] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2619.590122] loop4: detected capacity change from 0 to 256 [ 2619.594224] loop7: detected capacity change from 0 to 264192 [ 2619.598285] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2619.604445] loop7: detected capacity change from 0 to 256 [ 2619.609375] loop5: detected capacity change from 0 to 256 [ 2619.630643] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:19 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) r7 = epoll_create(0x3) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff], 0x5) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2619.645414] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:19 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:19 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}}, 0x20000000) 22:59:19 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:19 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2619.788224] loop4: detected capacity change from 0 to 256 [ 2619.789614] loop6: detected capacity change from 0 to 76800 [ 2619.795249] FAT-fs (loop6): bogus number of reserved sectors [ 2619.795746] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2619.810370] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:35 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfine', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:35 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:35 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) [ 2634.998028] loop4: detected capacity change from 0 to 256 22:59:35 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) r7 = epoll_create(0x3) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff], 0x5) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:35 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, 0x0) fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:35 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:59:35 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, 0x0) fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:35 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2635.026602] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:35 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) r7 = epoll_create(0x3) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2635.065825] loop7: detected capacity change from 0 to 264192 [ 2635.084357] loop5: detected capacity change from 0 to 264192 [ 2635.095166] loop6: detected capacity change from 0 to 76800 22:59:35 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) [ 2635.103309] loop7: detected capacity change from 0 to 256 [ 2635.116388] loop5: detected capacity change from 0 to 256 [ 2635.117631] FAT-fs (loop6): bogus number of reserved sectors [ 2635.118553] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2635.136682] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:35 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2635.153398] loop4: detected capacity change from 0 to 256 22:59:35 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x0, 0x874, 0x8) [ 2635.161077] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2635.161869] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:35 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:35 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) 22:59:35 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:35 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, 0x0) fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:35 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:35 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,has', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2635.336164] loop4: detected capacity change from 0 to 256 [ 2635.349447] loop6: detected capacity change from 0 to 76800 [ 2635.358068] FAT-fs (loop6): bogus number of reserved sectors [ 2635.358548] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2635.373077] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2635.374849] loop7: detected capacity change from 0 to 264192 [ 2635.388124] loop7: detected capacity change from 0 to 256 [ 2635.395215] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2635.418121] loop5: detected capacity change from 0 to 264192 22:59:35 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x0, 0x874, 0x8) [ 2635.444651] loop5: detected capacity change from 0 to 256 [ 2635.474024] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:50 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x0, 0x874, 0x8) 22:59:50 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 22:59:50 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,has', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:50 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:50 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, 0x0) fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:50 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:50 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 22:59:50 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,has', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2650.379109] loop5: detected capacity change from 0 to 264192 [ 2650.379384] loop6: detected capacity change from 0 to 76800 [ 2650.386854] loop7: detected capacity change from 0 to 264192 [ 2650.391877] FAT-fs (loop6): bogus number of reserved sectors 22:59:50 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x0, 0x8) [ 2650.392774] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2650.398044] loop4: detected capacity change from 0 to 264192 [ 2650.412677] loop5: detected capacity change from 0 to 256 [ 2650.416282] loop7: detected capacity change from 0 to 256 [ 2650.431274] loop4: detected capacity change from 0 to 256 [ 2650.434743] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:50 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2650.447976] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2650.448847] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 22:59:50 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x1) preadv(r4, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, 0x0) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 22:59:50 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2665.054638] loop6: detected capacity change from 0 to 76800 23:00:05 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x0, 0x8) 23:00:05 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) r7 = epoll_create(0x3) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') 23:00:05 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 23:00:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x1) preadv(r4, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, 0x0) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 23:00:05 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, 0x0) fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 23:00:05 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x0, 0x874, 0x8) 23:00:05 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,has', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2665.079253] FAT-fs (loop6): bogus number of reserved sectors [ 2665.080187] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2665.084254] loop4: detected capacity change from 0 to 76800 [ 2665.092818] loop7: detected capacity change from 0 to 264192 [ 2665.098278] loop5: detected capacity change from 0 to 264192 [ 2665.101689] FAT-fs (loop4): bogus number of reserved sectors [ 2665.102158] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2665.109370] loop7: detected capacity change from 0 to 256 [ 2665.118708] loop5: detected capacity change from 0 to 256 [ 2665.128947] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2665.134691] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:00:05 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 23:00:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, 0x0) fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 23:00:05 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB, @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:05 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:05 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,u', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2665.299204] loop7: detected capacity change from 0 to 264192 23:00:05 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x0, 0x874, 0x8) 23:00:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r4, 0x400, 0x1) preadv(r4, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, 0x0) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2665.317989] loop7: detected capacity change from 0 to 256 [ 2665.323751] loop4: detected capacity change from 0 to 264192 23:00:05 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x0, 0x8) [ 2665.334050] loop5: detected capacity change from 0 to 264192 [ 2665.337862] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2665.350315] loop5: detected capacity change from 0 to 256 [ 2665.351241] loop4: detected capacity change from 0 to 256 [ 2665.359293] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2665.361587] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:00:05 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="9402e41a1b434bc215420b697c982a3d5db63ad8cec8bd2d0113fd8f80bdf4fb8f20896eb1da8af9bcbb8409c480c52bbe036eaff7c44643acdf4b08ca085201b3422ae685580d3711c606d685aef50834ededd2d706e1aa99504672ca7f25c473b19fec9b61511d947cede43288ce0ac8f6146ffb01d3727d88ead139c36e39b8c4b0b38f7aecda7aca85ee0dc08d2f969529724d01bd3293ed30aa905f21db90b8106940e015ba9169fa0f48c1ba44e0016bcfbe4ab69edc6ec83c1588cad5af9975712d4d7de788854206d724e8e02df555a65044f8c3c4379bdbcf2fe0fbb434bdfcc31cd0a782ba5a341c6de5fd88fe7a9a0710c7620a5690fc804e427c4adba645dee255a7046e6ea424ab727e30adcb1810d2bc6d3700000000fe65ffca32b6f1f316140000000000", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:05 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2665.426389] loop6: detected capacity change from 0 to 76800 23:00:05 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,me', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2665.450932] FAT-fs (loop6): bogus number of reserved sectors [ 2665.452050] FAT-fs (loop6): Can't find a valid FAT filesystem 23:00:05 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,u', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2665.509301] loop7: detected capacity change from 0 to 264192 [ 2665.520321] loop7: detected capacity change from 0 to 256 [ 2665.525926] loop5: detected capacity change from 0 to 264192 [ 2665.529685] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2665.540362] loop5: detected capacity change from 0 to 256 [ 2665.546669] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:00:20 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 23:00:20 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid=', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:20 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x0, 0x874, 0x8) 23:00:20 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x0) 23:00:20 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2680.275887] loop6: detected capacity change from 0 to 76800 [ 2680.284879] loop7: detected capacity change from 0 to 264192 23:00:20 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB="a579000647a0ad42f2a54a58d8019b20d7c0276264008126d610e6fc0ba89bd41cf5d8c05e74416d37b12959f48235a1fd276c4315d19fbef02a527f1f3667517f4071d84cc7f7c7797538fe49001642931bca041cf2840d35248856e4e1856c6a531ff7bc05bf16a2cca9ee75e2e681aebe3b2ecf61284571ff75938b9142bee2e3ccdb000c6c66c90e6f646903a515ca74f179d8862aabf1986690a5176038ef7c465da6ae5249acf7fcbe21eae153c2d3d5f80f7c5b85ccea4710af784fab9ae06a92dbace5b5c3f4d6a7640a0b649617149b7d0ff69ce02f91fd1d9c69c917f172eaeebdb54b6e"]) fcntl$dupfd(r1, 0x406, r3) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r6, &(0x7f0000000180)=""/16, 0x2f00, 0x68) r7 = epoll_create(0x3) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') 23:00:20 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,me', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:20 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,u', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2680.298142] loop4: detected capacity change from 0 to 264192 [ 2680.301073] FAT-fs (loop6): bogus number of reserved sectors [ 2680.301624] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2680.305984] loop5: detected capacity change from 0 to 264192 [ 2680.313914] loop7: detected capacity change from 0 to 256 [ 2680.316937] loop4: detected capacity change from 0 to 256 [ 2680.323368] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2680.328865] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2680.347368] loop5: detected capacity change from 0 to 256 23:00:20 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x0, 0x8) [ 2680.377264] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:00:20 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,me', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:20 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) (fail_nth: 1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2680.431973] loop6: detected capacity change from 0 to 76800 23:00:20 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) [ 2680.447642] FAT-fs (loop6): bogus number of reserved sectors [ 2680.448138] FAT-fs (loop6): Can't find a valid FAT filesystem 23:00:20 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x0) [ 2680.489365] loop7: detected capacity change from 0 to 264192 [ 2680.514197] loop7: detected capacity change from 0 to 256 [ 2680.528421] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:00:20 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) [ 2696.399377] loop6: detected capacity change from 0 to 76800 23:00:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 23:00:36 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcontext=unconfined_u,hash,uid', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) r5 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r5, 0x409, 0xd) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:36 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 23:00:36 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcon', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:36 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) (fail_nth: 2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) 23:00:36 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x0) 23:00:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{0x0, 0x0, 0x114c0000}, {0x0}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) pipe(&(0x7f00000000c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) (fail_nth: 1) fcntl$setlease(r0, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x0, 0x8) 23:00:36 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r3, &(0x7f0000000180)=""/16, 0x2f00, 0x68) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x0, 0x8) [ 2696.407350] loop7: detected capacity change from 0 to 264192 [ 2696.409413] FAT-fs (loop6): bogus number of reserved sectors [ 2696.409890] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2696.417367] loop7: detected capacity change from 0 to 256 [ 2696.421001] loop5: detected capacity change from 0 to 264192 [ 2696.428714] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2696.443048] loop4: detected capacity change from 0 to 256 [ 2696.485317] loop5: detected capacity change from 0 to 256 23:00:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25, 0x114c0000}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000011200)=ANY=[]) unlinkat(r0, &(0x7f0000000040)='./file1\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(r2, &(0x7f00000011c0)='./file2\x00', 0x20000, 0x82) openat(r1, &(0x7f0000001180)='./file1\x00', 0x44000, 0x40) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r5, 0x400, 0x1) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000000180)=""/4090, 0xffa}], 0x1, 0x7, 0x3) ioctl$AUTOFS_DEV_IOCTL_FAIL(r5, 0xc0189377, &(0x7f0000001480)=ANY=[@ANYBLOB="0100000001010000180000008f676efa438f8b1de10f0d18a0f2fe3d684c250d7521a8110be2d7b55cfae9c3ae82178c4a0ff08d721bdc3f76ad4a32008111c48932068b9f908ed0d40b430f04b6cca1e6cb66251d9f0e2f09ee469d961ba13e6af46f936a294abfbf5f4c30553b444dd4a200d0b7d8620f4673e5f12913e681d972be1c021209e80c25a2e7d932924dd4b1eed012b4e37a3d718b11f9522a3474b5391dc2e816265362d693fa9f2638dc35d6327a71a6ca626dc4fa7ebe9ef560de6b6d70c946d981231acd7c6a4fee67e3af99612b8b290381c354a839ecc7fdf0803a99de84", @ANYRES32=r4, @ANYBLOB]) fcntl$dupfd(r1, 0x406, r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba5d535b"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') fallocate(0xffffffffffffffff, 0x30, 0x874, 0x8) 23:00:36 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2000}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r1) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) r4 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x100000001, 0x0, &(0x7f0000000240), 0x41400, &(0x7f0000000a80)=ANY=[@ANYBLOB='check=strict,dots,dots,dmask=00000000000000000173621,measure,mask=^MAY_EXEC,rootcon', @ANYRESDEC, @ANYBLOB="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", @ANYRES64, @ANYBLOB="2c736d61636b66736665663d7666616839723d3030ffcde7f830303030303030303030305e849ab2778e47ca73bd834868cb0a06ccf4ba2ef8062b4366e08daf4bf711803515cb06c709c0a2611315bcc97021fba500c2c825cc7092acc572f4d741c07500000000000000"]) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r3, {r4}}, './file0\x00'}) ftruncate(r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000001680)={r1, 0x101, 0x2, 0x778d}) memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) close(0xffffffffffffffff) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2696.521367] loop7: detected capacity change from 0 to 264192 [ 2696.527326] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2696.532439] loop7: detected capacity change from 0 to 256 [ 2696.535422] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2696.542855] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 23:00:36 executing program 3: unlinkat(0xffffffffffffffff, 0x0, 0x0) chdir(0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/keys\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001380)={&(0x7f0000001280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08cb730025bd70bbda442f9b7e5fd1c47e8259699d3fecffdbdf2528ff0700000004002c2ee6ad89f3c42279301f9f5bcbc6f1dbf2451233524b29", @ANYRES32=0x0, @ANYBLOB="0a004600e58cce07027400002b85a52dcf6bb2b7b3d6712c359b2dcc49dc26008a7e637efc3e0ffacd1c5dd5627eba"], 0x28}, 0x1, 0x0, 0x0, 0x1000}, 0x48050) 23:00:36 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1f, 0x2}}, './file0\x00'}) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="3047cd75e21ca31f5ab387e5ca001f85adf512a11f590bc28bce2f64e3b9e9ca72ead5a1cdee5992bf769e271fa3bfcd58433edf68dfac407fb72b", @ANYRES16=0x0, @ANYBLOB="000026bd7000fddbdf256a00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990006000000220000000500d20005000000"], 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ftruncate(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) (fail_nth: 3) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000001680)={0xffffffffffffffff, 0x101, 0x2, 0x778d}) syz_io_uring_setup(0xaaf, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f0000000640), 0xc, &(0x7f0000001740)={&(0x7f0000001700)={0x34, 0x0, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x4}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x6}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1f}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) [ 2696.658135] FAULT_INJECTION: forcing a failure. [ 2696.658135] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 2696.659165] CPU: 0 PID: 11358 Comm: syz-executor.4 Not tainted 6.0.0-rc1-next-20220819 #1 [ 2696.659794] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1521 [ 2696.660419] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 11358, name: syz-executor.4 [ 2696.661089] preempt_count: 0, expected: 0 [ 2696.661403] RCU nest depth: 0, expected: 0 [ 2696.661732] no locks held by syz-executor.4/11358. [ 2696.662113] irq event stamp: 994 [ 2696.662376] hardirqs last enabled at (993): [] __up_console_sem+0x78/0x80 [ 2696.663027] hardirqs last disabled at (994): [] dump_stack_lvl+0x2e/0xb3 [ 2696.663665] softirqs last enabled at (978): [] __irq_exit_rcu+0x11b/0x180 [ 2696.664329] softirqs last disabled at (967): [] __irq_exit_rcu+0x11b/0x180 [ 2696.664984] CPU: 0 PID: 11358 Comm: syz-executor.4 Not tainted 6.0.0-rc1-next-20220819 #1 [ 2696.667973] syz-executor.4[11358] cmdline: /syz-executor.4 exec [ 2696.668701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2696.670531] Call Trace: [ 2696.670753] [ 2696.670929] dump_stack_lvl+0x8b/0xb3 [ 2696.671230] __might_resched.cold+0x222/0x26b [ 2696.671759] down_read_killable+0x75/0x490 [ 2696.672102] ? down_read_interruptible+0x490/0x490 [ 2696.672593] __access_remote_vm+0xac/0x6f0 [ 2696.672949] ? follow_phys+0x2c0/0x2c0 [ 2696.673262] ? do_raw_spin_lock+0x121/0x260 [ 2696.673700] ? rwlock_bug.part.0+0x90/0x90 [ 2696.674040] ? lock_release+0x3b2/0x750 [ 2696.674352] ? __up_console_sem+0x47/0x80 [ 2696.674783] get_mm_cmdline.part.0+0x214/0x600 [ 2696.675146] ? dname_to_vma_addr.isra.0+0x360/0x360 [ 2696.675615] ? _raw_spin_unlock_irqrestore+0x33/0x60 [ 2696.676037] get_task_cmdline_kernel+0x1e9/0x230 [ 2696.676415] dump_stack_print_cmdline.part.0+0x82/0x150 [ 2696.676934] ? _atomic_dec_and_lock_irqsave+0x150/0x150 [ 2696.677349] ? __wake_up_klogd.part.0+0xc5/0xf0 [ 2696.677835] ? dump_stack_print_info+0xc6/0x190 [ 2696.678204] dump_stack_print_info+0x185/0x190 [ 2696.678661] dump_stack_lvl+0x7f/0xb3 [ 2696.678961] should_fail.cold+0x5/0xa [ 2696.679261] _copy_from_user+0x2a/0x170 [ 2696.679662] __do_sys_memfd_create+0x103/0x4e0 [ 2696.680047] do_syscall_64+0x3b/0x90 [ 2696.680346] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2696.680852] RIP: 0033:0x7f3fc4f66b19 [ 2696.681158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2696.682589] RSP: 002b:00007f3fc24dbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2696.683203] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f3fc4f66b19 [ 2696.683824] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f3fc4fc00fb [ 2696.684388] RBP: 0000000000000002 R08: 0000000000010000 R09: ffffffffffffffff [ 2696.685000] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 2696.685849] R13: 00000000200000c0 R14: 0000000000020000 R15: 0000000020000040 [ 2696.686415] [ 2696.696072] syz-executor.4[11358] cmdline: /syz-executor.4 exec [ 2696.696633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2696.697572] Call Trace: [ 2696.697805] [ 2696.697987] dump_stack_lvl+0x8b/0xb3 [ 2696.698287] should_fail.cold+0x5/0xa [ 2696.698694] _copy_from_user+0x2a/0x170 [ 2696.699011] __do_sys_memfd_create+0x103/0x4e0 [ 2696.699387] do_syscall_64+0x3b/0x90 [ 2696.699775] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 2696.700192] RIP: 0033:0x7f3fc4f66b19 [ 2696.700565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2696.702000] RSP: 002b:00007f3fc24dbf48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2696.702665] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 00007f3fc4f66b19 [ 2696.703240] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00007f3fc4fc00fb [ 2696.703826] RBP: 0000000000000002 R08: 0000000000010000 R09: ffffffffffffffff [ 2696.704402] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 2696.705019] R13: 00000000200000c0 R14: 0000000000020000 R15: 0000000020000040 [ 2696.705704] VM DIAGNOSIS: 23:00:37 Registers: info registers vcpu 0 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff8240ad4c RDI=ffffffff8762a6c0 RBP=ffffffff8762a680 RSP=ffff88801b327480 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001 R12=0000000000002710 R13=0000000000000020 R14=fffffbfff0ec5527 R15=dffffc0000000000 RIP=ffffffff8240ada1 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f3fc24dc700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000020010000 CR3=0000000017c80000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000001 RBX=0000000000000001 RCX=0000000000000000 RDX=dffffc0000000000 RSI=ffffffff815a138e RDI=0000000000000001 RBP=ffffffff848ca180 RSP=ffff8880451178a0 R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000001 R13=4000000000000000 R14=000000000047b294 R15=ffff88807ffdc500 RIP=ffffffff841e2470 RFL=00000086 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2dbf010ff8 CR3=000000001d87e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000