0000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/353]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:19:07 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/371]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:19:07 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(r1, &(0x7f0000000400)='/proc/self/exe\x00', 0x298a00, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:19:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x40000000) 15:19:07 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000e80)=ANY=[@ANYBLOB="4c0300001b0001002cbd7000fcdbdf250d00000008006700", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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", @ANYRES32=0xee01, @ANYBLOB="518b6c491256705234adc8bc34f5b2901676185a2cb211253d082e24132d5db06cfe374bcaca85e4d1a5d290f9a37221bc214c3e3a5100866dfbe053b47f640000000020779a73b9976488aab7f4c20667e407000000b4d0b2663db5aa80d4a0c3ff4f8bad6e24bf5c205d4fcbae83766317bdeec6d3fb08ee63cf3456dbd38a7b36faa0efd3736392ac2c73d3d1673c66be2f17d235b96effb9ba780d50f368c3ce6f3dab4bcf4536b6081f884417aeb3d25d4a"], 0x34c}, 0x1, 0x0, 0x0, 0x20000004}, 0x20040000) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') [ 2741.894483] FAT-fs (loop3): bogus number of reserved sectors [ 2741.895786] FAT-fs (loop3): Can't find a valid FAT filesystem 15:19:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x40000700) 15:19:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000e80)=ANY=[@ANYBLOB="4c0300001b0001002cbd7000fcdbdf250d00000008006700", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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", @ANYRES32=0xee01, @ANYBLOB="518b6c491256705234adc8bc34f5b2901676185a2cb211253d082e24132d5db06cfe374bcaca85e4d1a5d290f9a37221bc214c3e3a5100866dfbe053b47f640000000020779a73b9976488aab7f4c20667e407000000b4d0b2663db5aa80d4a0c3ff4f8bad6e24bf5c205d4fcbae83766317bdeec6d3fb08ee63cf3456dbd38a7b36faa0efd3736392ac2c73d3d1673c66be2f17d235b96effb9ba780d50f368c3ce6f3dab4bcf4536b6081f884417aeb3d25d4a"], 0x34c}, 0x1, 0x0, 0x0, 0x20000004}, 0x20040000) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:19:23 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x80100, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) lremovexattr(&(0x7f0000000400)='./file2\x00', &(0x7f0000000540)=@known='trusted.overlay.opaque\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f00000005c0)={'#! ', './file1', [{}], 0xa, "47573c40e0d689531eccdbe901e1acbf0761b76eefad93be37b9e1762372b2ed84b6f52d32f9acc27738ee3f4d13399b6875ac375c48b63c948c3d8a7e07368e61d0c1983ef9d496622dd253a7ed2f4f685f7456dfc40b190bd5158b1e298668c1961da3237baed7f8d42e33b9311ebb3bae449eb78404abe7abd098daae7dcdff3753eeca7a9e3244ce28fc39782a14f9fa8503815e6697099178695646dce41f2895a3af98f2bcfd1646a1c7cd8dee7f17cc"}, 0xbf) chroot(&(0x7f0000000300)='./file1\x00') 15:19:23 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) pwritev2(r1, &(0x7f0000000440), 0x0, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:19:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/353]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:19:23 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/371]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:19:23 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2758.170040] FAT-fs (loop3): bogus number of reserved sectors [ 2758.171346] FAT-fs (loop3): Can't find a valid FAT filesystem [ 2758.187467] FAT-fs (loop4): bogus number of reserved sectors [ 2758.188240] FAT-fs (loop4): Can't find a valid FAT filesystem 15:19:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x50000700) 15:19:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/371]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:19:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x4, 0x5, 0x1, 0x1, 0x69, @dev={0xfe, 0x80, '\x00', 0x3d}, @local, 0x10, 0x20, 0x9, 0x4}}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x800, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 15:19:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:39 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x2820060, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000880)={0xffffffffffffffff, 0x9, 0xbc8, 0x4}) 15:19:39 executing program 1: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) fsync(r0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB="000000c4b4212bf87e4f822187ac1e01040002b2022998c2af0d5186aeaa7e6b8334660d0d31efd3a88854fab12f6641644fb3cb6705530a6f0b0018af5832aece409276fb5a035284efb9ffad2e58490b9f8f566a1ba7ac2d093b9773ac2c1b1a97d1cc3e6da7a271f777a63f83e3febd284a4ca1dec0a08592a300a0c724082da26cae282c872bb2aedc4e39915de919d797ab37b4bfec067bcbf2488203"], 0x20}}, 0x0) 15:19:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:39 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/366]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:19:39 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x4) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000400)) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:19:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x60000700) 15:19:39 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/365]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2774.135227] FAT-fs (loop4): bogus number of reserved sectors [ 2774.136555] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2774.151728] FAT-fs (loop3): bogus number of reserved sectors [ 2774.153047] FAT-fs (loop3): Can't find a valid FAT filesystem 15:19:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') pread64(r3, &(0x7f0000000040)=""/55, 0x37, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xde6f}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaedf}, 0x0, 0xffffffffffffffff, r3, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x10) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="000000020000000000000000"], &(0x7f0000000140)='\x00', &(0x7f0000000180)='ceph\x00', 0x10, &(0x7f00000001c0)='^\x00') getdents(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20d315) 15:19:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2774.246608] FAT-fs (loop4): bogus number of reserved sectors [ 2774.247926] FAT-fs (loop4): Can't find a valid FAT filesystem 15:19:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x64000000) 15:19:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:40 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/366]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2774.447800] FAT-fs (loop3): bogus number of reserved sectors [ 2774.449150] FAT-fs (loop3): Can't find a valid FAT filesystem 15:19:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/366]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:19:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{0x0}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2787.795937] FAT-fs (loop3): bogus number of reserved sectors [ 2787.796700] FAT-fs (loop3): Can't find a valid FAT filesystem 15:19:53 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000400)='./file2\x00', 0x1801) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) syz_mount_image$vfat(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x10001, 0x2, &(0x7f0000000640)=[{&(0x7f00000005c0)="d8311fcf1f44f798386c5b73ccc7dc56514720e6bd137479c3", 0x19, 0x3}, {&(0x7f0000000600)="eb", 0x1, 0x1ff}], 0x402, &(0x7f0000000680)=ANY=[@ANYBLOB='shortname=lower,rodir,utf8=0,utf8=0,oeam0\x00,measure,smackfsdef=blkio.bfq.dequeue\x00,\x00'/91]) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:19:53 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x0, &(0x7f0000000200), 0x0, 0x0) inotify_init1(0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000019c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x0, &(0x7f0000001980)=[r0], 0x1}, 0xae) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/unix\x00') creat(&(0x7f00000014c0)='./file0\x00', 0x0) readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) gettid() openat(0xffffffffffffffff, &(0x7f0000000600)='./file1\x00', 0x121080, 0x28) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x6) 15:19:53 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x2000000, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000400)={'sit0\x00', &(0x7f00000005c0)={'syztnl2\x00', 0x0, 0x4, 0x3f, 0x0, 0x20, 0x14, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1, 0x20, 0xc4, 0x7}}) chroot(&(0x7f0000000300)='./file1\x00') 15:19:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x81020000) 15:19:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/365]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2787.855621] FAT-fs (loop4): bogus number of reserved sectors [ 2787.856996] FAT-fs (loop4): Can't find a valid FAT filesystem 15:19:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x88a61d00) 15:19:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{0x0}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:53 executing program 1: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000003000000000000000000400000001414bb00b30d147b2dba00e1c9ebdb7e7bb20e4509979c11f1775b225f22e3951879925c52f8df6c90ee54aa9271a9fcd1844524682398875ff2c33794d9b3b238172f67e5b02acf669c2214269ccdcf221e6eff378d68b0a1f7588d4da68319947d0df2239636eb47997455c85b39aab6433c487040695899080c6634ef"], 0x18}}], 0x1, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x1, 0x200) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0xd00, 0x0) sendmsg$inet(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="23e7d8f565da964fd368cd40a192b4907e5032899cab66e9390f47dd461f89f6d6", 0x21}], 0x1}, 0x0) 15:19:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/361]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2787.987497] FAT-fs (loop3): bogus number of reserved sectors 15:19:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2787.988773] FAT-fs (loop3): Can't find a valid FAT filesystem 15:19:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xd8ea0000) 15:19:53 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/365]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2788.021043] FAT-fs (loop4): bogus number of reserved sectors [ 2788.021834] FAT-fs (loop4): Can't find a valid FAT filesystem 15:19:53 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000400)={0x0, @adiantum, 0x0, @desc2}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:19:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{0x0}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:19:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/365]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:19:54 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd7d6da10a8b16bf2bf2b67ed8b591", 0x27) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:19:54 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/361]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2788.224523] FAT-fs (loop4): bogus number of reserved sectors [ 2788.225181] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2788.319299] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value 15:20:08 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x47) open(&(0x7f0000000380)='./file0\x00', 0x20004, 0x48) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000400)="030000000000000077a2e6ddf80889819eecd945e314439d8a17fd966a028b5a0de16260609605be27dfb67ed8b591", 0x2f) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:20:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/361]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xd9ea0000) 15:20:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/371]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000400)='./file2\x00', 0x1801) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) syz_mount_image$vfat(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x10001, 0x2, &(0x7f0000000640)=[{&(0x7f00000005c0)="d8311fcf1f44f798386c5b73ccc7dc56514720e6bd137479c3", 0x19, 0x3}, {&(0x7f0000000600)="eb", 0x1, 0x1ff}], 0x402, &(0x7f0000000680)=ANY=[@ANYBLOB='shortname=lower,rodir,utf8=0,utf8=0,oeam0\x00,measure,smackfsdef=blkio.bfq.dequeue\x00,\x00'/91]) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:20:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x41a00, 0x7, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) close(0xffffffffffffffff) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') [ 2802.259007] FAT-fs (loop4): bogus number of reserved sectors [ 2802.259759] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2802.277446] FAT-fs (loop3): bogus number of reserved sectors [ 2802.278789] FAT-fs (loop3): Can't find a valid FAT filesystem 15:20:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xda010000) 15:20:08 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/371]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2802.401845] FAT-fs (loop4): bogus number of reserved sectors [ 2802.402548] FAT-fs (loop4): Can't find a valid FAT filesystem 15:20:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xe4ffffff) 15:20:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{0x0}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) pwritev2(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000640)=@IORING_OP_SEND={0x1a, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000600)="88ac44487706fd00def0d7eb7ed3a92dec20", 0x12, 0x4008004, 0x1}, 0xc7f6) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000000340)={0x1, 'veth1_macvtap\x00', {}, 0x5}) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) chroot(&(0x7f0000000300)='./file1\x00') 15:20:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000400)='./file2\x00', 0x1801) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) syz_mount_image$vfat(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x10001, 0x2, &(0x7f0000000640)=[{&(0x7f00000005c0)="d8311fcf1f44f798386c5b73ccc7dc56514720e6bd137479c3", 0x19, 0x3}, {&(0x7f0000000600)="eb", 0x1, 0x1ff}], 0x402, &(0x7f0000000680)=ANY=[@ANYBLOB='shortname=lower,rodir,utf8=0,utf8=0,oeam0\x00,measure,smackfsdef=blkio.bfq.dequeue\x00,\x00'/91]) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:20:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x1400, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40, 0x0, 0x3}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) writev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000540)="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", 0xfa}, {&(0x7f0000000640)="e2f4325b8625142e031aee79cd11c7efcd37928d7a96d9656cdb3bfb6e6a5a49cb45e5f68e8774037d78016c882e129c0cc05a7537a37598b3177e6b380ca00ed80451b9876c558f85ca4f0bac24011ee6b59e5d9497b116b8f74d9ac7f5fb98de1a299515ab724380b614b5595d267cd9a322b763b97eccf5b168151f2a9ef0b49bcf4a9a14a8c3d2e9507932c8f6cbe76737abf3dfc1e368e2a0f25474dff958a108042158ee2f97e7c8df938053d7f323a8404930d2d9b2b297ec7739796166a95f0ae37c1127ee41595b54979602b361132344161dec8786", 0xda}], 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) 15:20:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/371]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2816.753857] FAT-fs (loop3): bogus number of reserved sectors [ 2816.754609] FAT-fs (loop3): Can't find a valid FAT filesystem [ 2816.774504] FAT-fs (loop4): bogus number of reserved sectors [ 2816.775750] FAT-fs (loop4): Can't find a valid FAT filesystem 15:20:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000400)='./file2\x00', 0x1801) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) syz_mount_image$vfat(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x10001, 0x2, &(0x7f0000000640)=[{&(0x7f00000005c0)="d8311fcf1f44f798386c5b73ccc7dc56514720e6bd137479c3", 0x19, 0x3}, {&(0x7f0000000600)="eb", 0x1, 0x1ff}], 0x402, &(0x7f0000000680)=ANY=[@ANYBLOB='shortname=lower,rodir,utf8=0,utf8=0,oeam0\x00,measure,smackfsdef=blkio.bfq.dequeue\x00,\x00'/91]) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:20:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xe8ea0000) 15:20:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2816.893148] FAT-fs (loop3): bogus number of reserved sectors [ 2816.893910] FAT-fs (loop3): Can't find a valid FAT filesystem 15:20:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{0x0}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/374]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f0000000400)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x8) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:20:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xeff50002) 15:20:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x10, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x80) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file2\x00', 0x404005, 0x7) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000400)='veth0\x00', 0x10) [ 2817.058009] FAT-fs (loop4): bogus number of reserved sectors [ 2817.058710] FAT-fs (loop4): Can't find a valid FAT filesystem 15:20:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/devices/breakpoint', 0x144480, 0x8) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) io_uring_enter(0xffffffffffffffff, 0x0, 0xae5b, 0x0, &(0x7f00000001c0), 0x8) r1 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='\x00', 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff028}, {0x6, 0x0, 0x0, 0x401}]}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x7) syz_io_uring_setup(0x46f9, &(0x7f0000000280)={0x0, 0x851d, 0x4, 0x1, 0x223}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 15:20:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2817.124720] FAT-fs (loop3): bogus number of reserved sectors [ 2817.125580] FAT-fs (loop3): Can't find a valid FAT filesystem [ 2817.140257] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value 15:20:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{0x0}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xf4ffffff) [ 2817.257426] FAT-fs (loop4): bogus number of reserved sectors [ 2817.258118] FAT-fs (loop4): Can't find a valid FAT filesystem 15:20:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2817.296279] FAT-fs (loop3): bogus number of reserved sectors [ 2817.297571] FAT-fs (loop3): Can't find a valid FAT filesystem 15:20:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/devices/breakpoint', 0x144480, 0x8) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) io_uring_enter(0xffffffffffffffff, 0x0, 0xae5b, 0x0, &(0x7f00000001c0), 0x8) r1 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='\x00', 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff028}, {0x6, 0x0, 0x0, 0x401}]}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x7) syz_io_uring_setup(0x46f9, &(0x7f0000000280)={0x0, 0x851d, 0x4, 0x1, 0x223}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000300), &(0x7f0000000340)) 15:20:36 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/374]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000400)='./file0/file0\x00', 0xb4) mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:20:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/362]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:36 executing program 7: ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x0, 0x100) mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x6c010, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000580), 0x4}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r1, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:20:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:36 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xf5ffffff) 15:20:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000380)='/sys/devices/breakpoint', 0x144480, 0x8) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) io_uring_enter(0xffffffffffffffff, 0x0, 0xae5b, 0x0, &(0x7f00000001c0), 0x8) r1 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='\x00', 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, r1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff028}, {0x6, 0x0, 0x0, 0x401}]}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000240)=0x7) syz_io_uring_setup(0x46f9, &(0x7f0000000280)={0x0, 0x851d, 0x4, 0x1, 0x223}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000300), &(0x7f0000000340)) [ 2830.849789] FAT-fs (loop4): bogus number of reserved sectors [ 2830.850493] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2830.851312] FAT-fs (loop3): bogus number of reserved sectors [ 2830.852570] FAT-fs (loop3): Can't find a valid FAT filesystem 15:20:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/374]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:50 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0xebf]}, 0x8) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, r0}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x1, 0x4004, @fd, 0x401, 0x0, 0x0, 0x0, 0x1, {0x2}}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8, 0x18012, r1, 0x8000000) r5 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r5, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000a53000/0x3000)=nil, 0x3000, 0x9, 0x8010, 0xffffffffffffffff, 0x8000000) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r5, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x51e) 15:20:50 executing program 6: sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000047c0)=[{{&(0x7f0000000400)={0xa, 0x4e21, 0x5ce2, @private1, 0x1000}, 0x1c, &(0x7f0000001640)=[{&(0x7f0000000540)="2c760100e331fdafb008fb60ae75d9d62e915062de414fdb8937441e83815533b781de8877dfe1fdbae2e44c67749ddfcf9a99e058d04b88fab7dd977d24b50c5b81e4501870921976d9c8abf9605f2ba2b49a218913cf49591adfb926fe48572887b059d698a9efe4bf0954cc65a71497", 0x71}, {&(0x7f00000005c0)="936c4d38214f9703079e148885141dd8b274e2d2e9816e15ff1debc53abc8e3f1c7ec46853a629a8a116c3449a8b7f08aa6d736cd27a930fa8fb4e9473", 0x3d}, {&(0x7f0000000600)="f459a2f1d83d7f9be043b8c39de81b1a6e431870308bc70ba54e0d87021eb29d7336cae10d36", 0x26}, {&(0x7f0000000640)="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", 0x1000}], 0x4, &(0x7f0000001680)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x4f, 0x4, 0x2, 0x0, 0x0, [@private2, @local]}}}, @dstopts_2292={{0x100, 0x29, 0x4, {0x2f, 0x1c, '\x00', [@generic={0x1, 0xe3, "2bc7521d344bf37630b6c88a9673578c64ebbf704f6a15e9ad78d452e845df8cc25c1edef823fbe017537767427a52cdfe0bc4ee43498182f5ff5a3e6e12a0b3d6cb91599eb0d78c42acbd507c2ecb5e7958f50a01b094292a40eb5723dd008f340609c5e7b6055e742782b9aec1be17495d33a27aa970a6353955c0fa6bf3c812fde2b7097134d617dd0653f8fc1eb4e33d0d76ff2b908e4ba4fbaf0323f8f10519fd71af3f4c7a3f39a855851796365c16ff6b71a7355ff639ae77e085998a4d662161d130ffa3d652d1d03469ef3222329dffbcd6db1ab8860c083ecc28d99c997b"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x2}}, @hopopts={{0x58, 0x29, 0x36, {0x3a, 0x7, '\x00', [@calipso={0x7, 0x8, {0x2, 0x0, 0xc1, 0x388}}, @jumbo={0xc2, 0x4, 0x80}, @hao={0xc9, 0x10, @mcast1}, @calipso={0x7, 0x10, {0x3, 0x2, 0x0, 0x7ff, [0x7fff]}}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x9c07}]}}}, @hopopts_2292={{0x38, 0x29, 0x36, {0x16, 0x3, '\x00', [@jumbo={0xc2, 0x4, 0x80}, @pad1, @hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @rthdr={{0x78, 0x29, 0x39, {0x33, 0xc, 0x2, 0x40, 0x0, [@mcast2, @ipv4={'\x00', '\xff\xff', @local}, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, @remote, @private2={0xfc, 0x2, '\x00', 0x1}]}}}], 0x258}}, {{&(0x7f0000001900)={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x1c}, 0x7fffffff}, 0x1c, &(0x7f0000001c40)=[{&(0x7f0000001940)="f0e23e00e82a249f9529112ad08ecd87949ca6c51ac695bb7e39d0098295e1a54b16dcff52b457e060aeed566d1e161368145286ee389eb164c89004eb497686f01852c56eef2196023190719558afe57771f22ab4caa2fb5d16f0e703b87dff81eb28131a3450c63ddd177ff46496bb4aacd63b53edeb450012aac403b687b4e6de8ef099504691c1c6389da1ca9c5500823d6f5484965a78d541830252bfec6419efc00e6a3af463daef6591dc43746e22b1", 0xb3}, {&(0x7f0000001a00)="abcf84a475a958c4a42b91b7280eb9d263dddc14deac1cd04754b52f855db0ea2a47626bfede17e69fa7886c32ddc37b4d9748c89a601fa1f1cb493bafff", 0x3e}, {&(0x7f0000001a40)="fd0a3ab9c0d1885a3b8043e40d348cb74502ee3c56d2b1e6b4d7cde2ce35ee33e9864c2f709ff7108735565bbd0f78f9373528a9773fbceaa1a0b60aa51150960fead2e3c46d4b246a0c6533066a2b4614b190591e508f45258a131143cb87ed9346427d0ab0ce01056b8e082987caca0d6d044b50dd3d66f5e00685b2608055b1976ddcbb56473667f0b49c", 0x8c}, {&(0x7f0000001b00)="8beb01d7eec57c89c38ff2b206678c32cc755f155497a5cf1d6738a3f452058f9c81cda31aa6d76094e0bf27de2c625bc46ea36e2f92c3cedb0c69db5a9499003733ba76c4ec53571fda262fda0c848643f0cc1a0b7f155a7c403d2456a729c3dd9e2b410bdd6d4146b66b225d7318255c84dfee9506832330f7ac90a52658bfb6e4803d62", 0x85}, {&(0x7f0000001bc0)="839d0b0398cbb1a11a610dc55d93c9d47ed15aa7bb70d99e587beb854cc298df3d0267461acb47b87c785013524b0dcc9713b0eceea59fb5bc21f01d60bf61584f3983bb2066c9a42c84bcde38c91aad433608c914f96eef2683bd576c4d997e5695a2115423ef1c8649473d0ecee5bfe3b1", 0x72}], 0x5, &(0x7f0000001e00)=[@dstopts_2292={{0x40, 0x29, 0x4, {0x2b, 0x4, '\x00', [@jumbo={0xc2, 0x4, 0x8}, @hao={0xc9, 0x10, @empty}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}}}, @dstopts_2292={{0x50, 0x29, 0x4, {0x55, 0x6, '\x00', [@calipso={0x7, 0x18, {0x2, 0x4, 0x5, 0x12c, [0x0, 0x6460]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x18}}]}}}, @rthdrdstopts={{0x11d8, 0x29, 0x37, {0x73, 0x237, '\x00', [@calipso={0x7, 0x28, {0x0, 0x8, 0xff, 0x115e, [0x401, 0x7, 0x7f, 0x4]}}, @generic={0x6c, 0x9e, "1a5db93964038e3b88f5e6bb8c409d15553311529e157ef775eb72796410283400df056c5b03e5bae6e96464a93786c56f9923de469450c541ea7472ecfe98e04e60ebfc0c2bb3c65ca9de3247bb93d07d68c855f380e92f73f8340b7a01621a03ea974ae8a2d8adcfecc80c44aa058cecfdcf639be953bc72f1b44d8acf60836816621628fdc64c8843493194fed76803af49a5b5880fe87f0db12b6954"}, @generic={0x7, 0x1000, "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"}, @generic={0x9b, 0xec, "71ad6060e756c1a18b7efe119405231c72b0e969a71af4decd64154d7dc6dda902173ffde7a26a9ce0a445e8740e1dd3ca2f70054a066b4604f151b3cc6fc3d071e7b727e7bd59d56344f5dc162b8fc803556e3268614d47721696d0335f002483e0e410928b81487d2b0cc898303cb21f97192d65e331afa8dca415c889b880497862c696dcca45c130aacf6e31828cfe6759f581252a97200838fd41ac1d2d62d805625632269947d04385ff30dba5b6f2a1552619927d3333fbbbd0f143f653cf17c42b38a957e8b693f193cf678245d0c44d92a4f0b11dab728a87e7a5db495d7edb61ee08020759a8c1"}]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x4, 0x2, 0x0, 0xc0, 0x0, [@ipv4={'\x00', '\xff\xff', @remote}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @hopopts_2292={{0xd8, 0x29, 0x36, {0x3b, 0x17, '\x00', [@hao={0xc9, 0x10, @local}, @calipso={0x7, 0x40, {0x2, 0xe, 0x8d, 0x1000, [0x4, 0x72, 0x101, 0xffffffff, 0x3, 0x6, 0x3]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x6}, @calipso={0x7, 0x38, {0x0, 0xc, 0x70, 0x1000, [0x3, 0x4, 0xfff, 0x3, 0xd7c6, 0x3f]}}, @enc_lim={0x4, 0x1, 0x1}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x29}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}, @hopopts={{0xe0, 0x29, 0x36, {0x3b, 0x18, '\x00', [@generic={0x1, 0xb1, "246b7a3caf9414c649fb11e3e06c6e47a378f966e2920a49ae4f665d5d8859d4a81a022e0e628d5cc506593ac09f40421b81d63b7bc9daaac88a7a38f7d6a4f75ee697023355f9aa9e1e10dea8d6588cb041567a5a35fe72599ea17fabb1d8cc1a14a4775854ff822e33158b29ab39b5749d3da5054fe75bc097b450b783a38c7974e442eafc8bec04b4d4b6da04a1e43a543411afbcfbefe379800d2dfe331814a6fef5cf203483268f14a557caae10df"}, @hao={0xc9, 0x10, @loopback}]}}}], 0x1478}}, {{&(0x7f0000001cc0)={0xa, 0x4e22, 0x10000, @private0, 0x2}, 0x1c, &(0x7f0000004480)=[{&(0x7f0000003280)="038fe507419e7e3709e7a27482304cf7ba9e29bc13f8e4f6c05e07ead2d82c0c410cc11183da586932c21f685c38581c44bb1eb2509b95a7f89681100ce2f315ebcddcf5f372f8ef8f20a4062e7ac247fbcde77f8ac26b8a8451f7a743d6ec45dc0e7fbc01577b0b87dcb2800ae9fb5c36c6f1d42d78fbce8f7feecfff740116d800f71540fe097f26f8119aff5a65da170f9143d5d2ca6a4a4e489f322845427982022d5055e3e30d5c53d097981e", 0xaf}, {&(0x7f0000001d00)="67799e4a2794", 0x6}, {&(0x7f0000003340)="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", 0x1000}, {&(0x7f0000004340)="87dc7be12ce62a7a7e75f2b18bbb879b3073addb88f5b9dac59e662c312d1c73e3c1b0338a4aa4cd3c10ca02129b51e0b9960dd8da3cbe1915d1ba8c94c7d9888cd5f2f7086d17b1334ac5999876b32600488ccbce656c5cb023732c9edf92fc7caac10cb3854876cf241d34f8a79c14af4d1782f7e622ef19400d5d9a9b6c9df695cfdb9fc31c394b", 0x89}, {&(0x7f0000004400)="0aa3d50f8f491a2183ed91f1e7d14cfe4d9ff2cafac5c1ee1f4a0d0e1e606907c72dda1cabbd489cebcdcca49c8a3a11d5a9e47493eabc6710e3f941c0f020be1a860db742af4769c7367850434dd7ea96bc8dc0338bdd7f0810b82e185c604990ae78523e", 0x65}], 0x5, &(0x7f0000001d40)=[@hopopts_2292={{0x20, 0x29, 0x36, {0x3b, 0x0, '\x00', [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}], 0x20}}, {{&(0x7f0000004500)={0xa, 0x4e24, 0x0, @mcast2, 0x5}, 0x1c, &(0x7f0000004640)=[{&(0x7f0000004540)="3d63f0fbc50194a673b334b096d43e499fac59a7ad1991178715efaf43f79d87dd238db4b8d4a5152020b7d973c8777185c60612f4651c65f9f06bcfcb34e6b2e41a234c3c4b62d66d4c343a659ceeaa5eff04ef3eef0d6b2db503dce91926dbaa8c5cb1c114abb8668a45a5fcb215a6ececba70c6c2a91925e261a56dd1f7dc020ac02c5ab991a2bc35c5f7d9628fc01538ea7658ba1193f0f836c7b6a814439c8a721f3b932c13814f2221b10ab3f92a93adf98525e2938ce31f41d0d388ffcca50f7b", 0xc4}], 0x1, &(0x7f0000004680)=[@dontfrag={{0x14, 0x29, 0x3e, 0x401}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x2, 0xe, 0x0, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x1e}, @private2, @private0, @loopback, @dev={0xfe, 0x80, '\x00', 0x2f}, @dev={0xfe, 0x80, '\x00', 0x44}]}}}, @hopopts_2292={{0x48, 0x29, 0x36, {0x32, 0x5, '\x00', [@ra={0x5, 0x2, 0x1}, @calipso={0x7, 0x20, {0x3, 0x6, 0xfa, 0x6, [0x1, 0x5, 0x481152d5]}}, @jumbo={0xc2, 0x4, 0x8}]}}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x33, 0x4, '\x00', [@hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @empty}}, @enc_lim={0x4, 0x1, 0xff}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x39}}]}}}, @tclass={{0x14, 0x29, 0x43, 0x5}}], 0x140}}], 0x4, 0x800) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6ef7011a0fb46eea, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:20:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xfbffffff) 15:20:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) openat(r3, &(0x7f0000000540)='./file0\x00', 0x204080, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:20:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/362]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2844.648573] FAT-fs (loop3): invalid media value (0x00) [ 2844.649725] FAT-fs (loop3): Can't find a valid FAT filesystem [ 2844.677339] FAT-fs (loop4): bogus number of reserved sectors [ 2844.678737] FAT-fs (loop4): Can't find a valid FAT filesystem 15:20:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/375]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xfeffffff) 15:20:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000600)={'xfrm0\x00', &(0x7f00000005c0)=@ethtool_gfeatures={0x3a, 0x2, [{}, {}]}}) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') [ 2844.922497] FAT-fs (loop4): bogus number of reserved sectors [ 2844.923791] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2844.968488] FAT-fs (loop3): invalid media value (0x00) [ 2844.969727] FAT-fs (loop3): Can't find a valid FAT filesystem 15:20:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') pread64(r2, &(0x7f0000000040)=""/55, 0x37, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:20:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/362]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xff010000) 15:20:50 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/375]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:20:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r3, 0x4, 0x42800) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r4, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYRESOCT=r1, @ANYBLOB="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", @ANYRES32=r3], 0x20}, 0x1, 0x0, 0x0, 0x24000040}, 0x4044085) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @rand_addr=' \x01\x00', 0x62, 0x8, 0xffff, 0x0, 0x6, 0x44, r6}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) setpriority(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)={0x2}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x1010, r0, 0x8000000) write(r3, &(0x7f0000000080)="1f", 0x1) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x8f9d, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x200000000000000}, 0x8810, 0x0, 0x0, 0x1, 0x800000, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x6805, 0x0) splice(r2, 0x0, r0, 0x0, 0xfdef, 0x0) 15:20:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2845.249516] FAT-fs (loop4): bogus number of reserved sectors [ 2845.250863] FAT-fs (loop4): Can't find a valid FAT filesystem 15:20:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/363]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2845.304720] FAT-fs (loop3): invalid media value (0x00) [ 2845.306539] FAT-fs (loop3): Can't find a valid FAT filesystem 15:20:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0xfffffffffffffffd}, {0x0, 0x0, 0x1000a00}], 0x1102000, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(r1, &(0x7f0000000000)='./file1\x00', 0x0, 0x51) openat(0xffffffffffffffff, &(0x7f0000000580)='./file1\x00', 0x1594c1, 0x68) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') unlinkat(0xffffffffffffffff, &(0x7f0000000400)='./file2\x00', 0x200) 15:20:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:20:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) close(r0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r3, 0x4, 0x42800) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r4, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYRESOCT=r1, @ANYBLOB="baf7d29b575b7dff920238a96656eac32ce51fa5f53ae4510c799fa0034a7bea50d43659e5f131f7a4236454f717d682366019a06f634020ba7cbcd895be035f9814dd4524a55662240c2b2581e5295cc3209ec56ced4b7495d0b8e5be6ba57935fd9455b46da3300b67fe0acf7d8d1df5ccee0a05ec5f3ad7937321fa6e5cb049590673d343a82dcf5891da24afa143dde6167af56e6ffd0f8eae36d8e1eee8f83d804f599aad283b2ec95c3a023d9dc2c40989e5270d92b942fe7d43246920192ae44602a77c343174c05bc5c66d06fc91004ef3cd9e9cf490e7031d3fba61bcce0a55b2d37667f5f93293171671284e82356c582b550937b7078e2e10", @ANYRES32=r3], 0x20}, 0x1, 0x0, 0x0, 0x24000040}, 0x4044085) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000140)={@private2, @private1={0xfc, 0x1, '\x00', 0x1}, @rand_addr=' \x01\x00', 0x62, 0x8, 0xffff, 0x0, 0x6, 0x44, r6}) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) setpriority(0x0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000000c0)={0x2}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x6, 0x1010, r0, 0x8000000) write(r3, &(0x7f0000000080)="1f", 0x1) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x8f9d, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x200000000000000}, 0x8810, 0x0, 0x0, 0x1, 0x800000, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x6805, 0x0) splice(r2, 0x0, r0, 0x0, 0xfdef, 0x0) 15:20:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xffefffff) [ 2845.393812] FAT-fs (loop4): bogus number of reserved sectors [ 2845.395081] FAT-fs (loop4): Can't find a valid FAT filesystem 15:21:04 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/363]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:04 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xffff0000) 15:21:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000400)='./file2\x00', 0xa2) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:21:04 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/375]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xfeffffff) 15:21:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e6661740002080100047001f801", 0x15}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000600)=ANY=[@ANYRESOCT, @ANYRESHEX, @ANYRES64, @ANYRES16, @ANYBLOB="80c0d477befe53bf0a92ae46cc4a4252d61ca71aeabd6aa44ba3a1bd48eebe02040fd15abc9f6e6ba6f230dd85cd2c21d73cf813d732e68ab3afa4932c12b4d6b646f26d6604334a516f9cfb2ef3914594b7ae6c92ad89c6507b7d01843d95364de11c3dd741f247bf2c2705ac6a1eac812aef55483ede5efc678333d8d634e76765218f924cb123235b6921f45f3093d079c5a1e22760131c85b8d49f0e4ceae5b9f8889330f2ef05803d2609a1bcd743e063c20bb5d83485de2c03393c1fbf23f5952b5873e14bbe63915bd07b8941b2a366313a09edaf28df72a959c700b85ab89ce2ffa360b4f6", @ANYRES16, @ANYRES32]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x10000, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/55, 0x37, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000400)={0x2, 0x4e23, @remote}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') [ 2859.132907] FAT-fs (loop7): Unrecognized mount option "017777777777777777777770xffffffffffffffffÿÿÿÿÿÿÿÿÿÿ€ÀÔw¾þS¿ [ 2859.132907] ’®FÌJBRÖ§ê½j¤K£¡½Hî¾ÑZ¼Ÿnk¦ò0Ý…Í" or missing value [ 2859.155038] FAT-fs (loop4): bogus number of reserved sectors [ 2859.156345] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2859.158171] FAT-fs (loop3): invalid media value (0x00) 15:21:05 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xffffefff) [ 2859.159320] FAT-fs (loop3): Can't find a valid FAT filesystem 15:21:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/363]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2859.235254] FAT-fs (loop7): Unrecognized mount option "017777777777777777777770xffffffffffffffffÿÿÿÿÿÿÿÿÿÿ€ÀÔw¾þS¿ [ 2859.235254] ’®FÌJBRÖ§ê½j¤K£¡½Hî¾ÑZ¼Ÿnk¦ò0Ý…Í" or missing value 15:21:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) r1 = gettid() setpriority(0x0, r1, 0x0) fcntl$setown(r0, 0x8, r1) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000800)={'ip6gre0\x00', &(0x7f0000000780)={'ip6_vti0\x00', 0x0, 0x4, 0x70, 0xe, 0xc173, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev={0xfe, 0x80, '\x00', 0x26}, 0x20, 0x10, 0x8, 0x2}}) r2 = clone3(&(0x7f0000000440)={0x200000000, &(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000140), {0x10}, &(0x7f0000000280)=""/213, 0xd5, &(0x7f0000000380)=""/146, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) clone3(&(0x7f0000000680)={0x1000, &(0x7f00000001c0), &(0x7f00000004c0)=0x0, &(0x7f0000000500), {0x41}, &(0x7f0000000540)=""/5, 0x5, &(0x7f0000000580)=""/143, &(0x7f0000000640)=[r2, r2, r3], 0x3}, 0x58) syz_open_procfs(r4, &(0x7f0000000700)='personality\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x6, @ipv4={'\x00', '\xff\xff', @loopback}, 0x401}, 0x1c) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}], 0x4009, &(0x7f0000012b00)=ANY=[]) 15:21:05 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffc, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:21:05 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r1, 0x0, 0x3) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080), &(0x7f0000000400)={0x0, 0xfb, 0x2a, 0x3, 0x5, "e90a778c76633ed225f974ca0100fbf1", "9f0d9ee601aec55cff9112ef2d82c109005c738a2a"}, 0x2a, 0x2) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) fallocate(r3, 0x2, 0x2, 0x6985) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x0, [0xfffff4b7, 0xb6, 0x401]}, &(0x7f00000001c0)=0x44) sendmsg$nl_generic(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r4, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) timerfd_create(0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r5, 0x200, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x401, 0x6a}}}}, [@chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x11}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}]]}, 0x38}, 0x1, 0x0, 0x0, 0x50}, 0x0) open_tree(r1, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) timerfd_settime(r2, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, &(0x7f0000000440)) 15:21:18 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) lseek(r1, 0x0, 0x3) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080), &(0x7f0000000400)={0x0, 0xfb, 0x2a, 0x3, 0x5, "e90a778c76633ed225f974ca0100fbf1", "9f0d9ee601aec55cff9112ef2d82c109005c738a2a"}, 0x2a, 0x2) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) fallocate(r3, 0x2, 0x2, 0x6985) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x0, [0xfffff4b7, 0xb6, 0x401]}, &(0x7f00000001c0)=0x44) sendmsg$nl_generic(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) close_range(0xffffffffffffffff, r4, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) timerfd_create(0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r5, 0x200, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x401, 0x6a}}}}, [@chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x11}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}]]}, 0x38}, 0x1, 0x0, 0x0, 0x50}, 0x0) open_tree(r1, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) unshare(0x48020200) timerfd_settime(r2, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, &(0x7f0000000440)) 15:21:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:18 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000400)=ANY=[@ANYRESDEC]) accept$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x1) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e9a67f0211ef77a2e6ddf81100d945439d8a1759b68073d995b8298eb40bb20d3391000000", 0x68) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:21:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xffffff7f) 15:21:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:18 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000400), 0x2, 0x0) write(r4, &(0x7f0000000540)="02c9e9000000800000009eecd945439d8a17fd9664028b700d7d0400000000000000c4424a5dc7eba5de0c764f", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) inotify_add_watch(r3, &(0x7f0000000380)='./file2\x00', 0x448) chroot(&(0x7f0000000300)='./file1\x00') 15:21:18 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2872.825797] FAT-fs (loop6): Unrecognized mount option "18446744073709551615" or missing value [ 2872.876711] FAT-fs (loop3): invalid media value (0x00) [ 2872.877896] FAT-fs (loop3): Can't find a valid FAT filesystem 15:21:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xffffffe4) [ 2872.892495] FAT-fs (loop4): invalid media value (0x00) [ 2872.893702] FAT-fs (loop4): Can't find a valid FAT filesystem 15:21:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2872.975917] FAT-fs (loop6): Unrecognized mount option "18446744073709551615" or missing value 15:21:18 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2873.125714] FAT-fs (loop4): invalid media value (0x00) [ 2873.127050] FAT-fs (loop4): Can't find a valid FAT filesystem [ 2873.131803] FAT-fs (loop3): invalid media value (0x00) [ 2873.132527] FAT-fs (loop3): Can't find a valid FAT filesystem 15:21:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:32 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f0000000580)="de7dc1c7601feec0c36d1c746e0a52572f65cd3cc2f6b6b52ae369f4861e051df6cefa0cb61589ce649d246c94696700603099297d6d31c0075d1e8e22bccb064143852ee01f7a10f131e8568f4dd2ba", 0x50}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') finit_module(r0, &(0x7f0000000540)='[\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000400)={0x0, 0x3, 0x3, 0x6}) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:21:32 executing program 1: stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000b0000000001000018", 0x5a, 0x80}], 0x320041, &(0x7f0000000100)={[], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@subj_role={'subj_role', 0x3d, 'ext2\x00'}}, {@euid_lt}, {@euid_gt={'euid>', r0}}]}) 15:21:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xfffffff4) 15:21:32 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x3, 0xe0, 0x81, 0xb7, 0x0, 0x4, 0x20010, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe9e, 0x2, @perf_config_ext={0x1, 0x2f}, 0x1d00, 0x8000000, 0x50000000, 0x4, 0x1, 0x80000000, 0x3, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:21:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2886.672136] FAT-fs (loop3): bogus number of FAT sectors [ 2886.673533] FAT-fs (loop3): Can't find a valid FAT filesystem [ 2886.706958] FAT-fs (loop4): invalid media value (0x00) [ 2886.708114] FAT-fs (loop4): Can't find a valid FAT filesystem 15:21:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') pread64(r0, &(0x7f0000000040)=""/55, 0x37, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x4e21, 0x1, @local, 0x7}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000240)={0x0, 0x5, 0x1, 'queue1\x00', 0x61}) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000140ce5cdec128aabe9825b5cde8b0a09571419a0eba2669e08cdf6f53c3f4d3977cbc04ee37b79e0c7837b9b21d41a7034918ea5cdb1d7f5251828baa02854efb2d140834a8df212940e1a95eade19fad96dc7cc648827cc2ffc6a5806d99ea4527aea4539346df07f7a67e517fe208a6b6674cc44b9827ca33ebf9b1a9d12462d6878b6fc9950932a63e8c54585f86100280c1c5530f4c282221f88ac1bcb0b361d92eb15391d8ee5c3691cd9ab538545e5fd8615f2019de819a3f0a76706dede5e1e097a9a08bf2cee04fff9b7ecd78941b9a7e2393efd615ef69d6b9618", @ANYRES32=r1, @ANYBLOB="06000000000000002e2f66696c653000"]) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000040)=0x5c) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x3c4, 0x12, 0xa, 0x8, "1ad42a692621d16f0ac9b405beaecbf1117f119cdd85f6b5811c4585b829d57a9628a9e1a2d9a4c991684d8dcc9a00e13199ed0eb08c0ac2e0f3dc044230843a", "3a217a4da0cf0da72507e41d82badab3b29b7d369b17eb12fefd93c5f6cd7373", [0x3ff, 0x7ff]}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB='}\x00']) 15:21:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xfffffff5) 15:21:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2886.926707] FAT-fs (loop3): bogus number of FAT sectors [ 2886.927876] FAT-fs (loop3): Can't find a valid FAT filesystem [ 2886.969044] FAT-fs (loop4): invalid media value (0x00) [ 2886.970208] FAT-fs (loop4): Can't find a valid FAT filesystem 15:21:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:32 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000001940)=[{&(0x7f00000002c0)="81", 0x1}, {&(0x7f0000000540)="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", 0xff}, {&(0x7f0000000640)="7582e1c53cffb79a9f84d351be00a7aa4582441b03d6adb125e8d7c7b9184a8cc80a4ad5d4860621dd6597df0f3e20448a73c8fbebb995ce35bf82cc3d5a8a1307cd980b73782b0463fb6c7b1f62387a024478cb01223e35ce104886f67e4f0526a8f3ea2a463a62b5de963662aa42daf3cd8401d03efc931b8af1324bf61cb6a42117de0deb1c9ee30d31abc83e74b2bc06722e9c5327e303090f835b70163bf66faf980073e3b53ab2c2940d0d43848b7cf52275869dca5bc554c589266774de7d9e27436a412c3d77b0009c7f337898c5c8f46e94999d3c8cb7e7eac2c81b5d1c7f05cfd4bd56d8bd725103d79bcfb6df4fbe036cd3536498ebd4f81ed4a803a5c85d72f95dbfb62e0a667e29f27f08c4cdc66283f93a5cf8648dd015cefded0403eb6f9e8e77753be1655aa53cc7a394cc1768346e03678e079b435b3ed4092e6c613528707d7dd71df3d1b73285c561cb19322242bdac11a3627a27b8f031f3f845ac7741ea024f710fe76d13e7e0a1486b8a8910a97245e2f26f480ad825ac65fc19b8c56ca878b04d89c0f912b23d32cd58ad3b8a443ee7fc69f01ee97b30705ef8c985d396b93881c141b7b7979956a7d2d142f954887f63ca464cb0fe11dd1993dfb0c2546f08953bb10cdc4c5df9af55702a5baf6f267c2a76daae0c4aa153bb32a8e2e951cab2741b67e19b904eb6268e58baed8a618b0f695dfacf0a5ac9a5b83eca438cfda5a7039551e6fa4f0a213205146859acfc783bf7b106baad327fe045740013f9d0c79ea12feee3027c6e4b5b63c2cdf9ca10593b49723d91d02fa70370f9d6401577aa3fdbb23be211576884bc59abb793f27c66a707a7270718e9bde2427f62626322d1fe72750efc1c5a2967d3d9162a2731fadbf22a771cf291abee0e0924f2308f8c954ceea750b6ae87fb2b2a45eea813d300e04a49a64683b19f85b1b9075fa26b212ef3fc718037fe54e3de402fff1147de608a8380ed0d34f7d7ebbfe10d0c213f7d8313ae588f72cb4d46a1538b5868b1fd633b069a710f0d68e11beebb9f2996b47e783ea6e316abebf9d525238b575e504a294e290a44926caf1f6f9953eee876c42cd05043839a8f985187cb0e7773ce85219375635f428c1959487bacb39076ceae1bc6187e8100b7fbe39390b9fe4c6de9d2502ba13420351ffca1ab29f228c2fc953c02fb6708e4ab39344c5242807b99550ab5273aea631236bce4fb6f6bd56e898b112319daa60d33783120be0275617d9aabd19ea3b53e71d064f99d70bf41e0516194127d16a4674d6f6496c3b94fdd79262c05d2491e16a5da989962ab637bc989415db02913342e17929c152739a8e9c22200a355ed279d13f82780a8f60d09fdb6a63cbadd2e2a17e547ece27f2c661efc1b44fe932a14856b1aee303194b4d6fc544c50de85deda88a4c725dd71072cb6ac65247a9667da43eef7a6f2fb206b03981aec13e9b5e503edfa54dec0af0006d809972d8d38d7eac3d1c83476039fbe0eb2b39684bf565ac0da18226a4e6ffa67d2cb6a6ffffb71558f9a240f61a8e58fbe82c12f66fea6f8fd838ba24d7bcc3ff40689523cca9d393ccf86bb8710c99093965f8a71b49601291807ed6ad085242cd477d5d219600ea205f1d0c9f60f946c9c7f4fcb0cad6cdb018f708754d28de9bd2b1c118d4a16d2a5caa645fde385b08add11930b82a04189b37c64866b84dd138c765700150412232455021229f5daba7f155997efea51f8c5e99fb4ecc4b061ac0dbdb7ad3235933335dbee1928468aec3c3ee8864b6437d777186576810505573d2749fcb797c4965da806809a8ba5547aa7afb9a3787b27df085462db84d9cd20f6d72580700e02364f22cc531eabebb9e5a089e8270dcecfe813ac27efcea15123e8ed0f3f5356c94d641be661a8f08dfa5659c1a0b8e94e19a63a523eddf15a8254e71cbd2a53dbe6d1155bd7458e5461b43d6cbe5e62fb1ee65356a9ecdfdb3625440cd0d834ce05e85186dc28b80b658b18ad7b8bd842fb6a2a30ca8c9820fbf4fed52ed796cb7383bcda7294f7606964d0ca926bfad55b6d37cde9c2c099f68e7bed75b0133e8d88a0462beb4704a877bf187974a1be00d4b1ccaa192b507953355fa993d8164a33c769db55c9fa7d224d70eb8571ad5c07f3eb7265a19117d781e8f7c7b2a00159c327aa193a8655b9e611ded06c7f1fca0723ef78cdf18da0d63a4b6f8930ddbefb9f956108f738db1f1163f03b69544c3d1151b2d6ff3e50ba781958a183a6e567f877cd53802cac8cb5341cc45df50411810bdb3e58683d45516892b309b91d3e553e52c7a7408641e2709bea03dceca91ff305d3c72c4c770e34f3d4669addf406093f719e3291e61e24f242823e005024514697b806d6e1a747a09b39eae1fae9b28bbbff1fa1edfb58ba7ae44640c3b0e1fbe7332a079d0c9a182682e625fdca64484d324e8c8fa4067d9d7d0e13adcc1ba2c0191e0985611d6b446ab50f691e682968f65c26bf11603804606a1cc1b0260772db87c7382016b62cb7aa3f8da4754f76349d9977c371aa4417276ddea13b379091866bbdf93503266f9249c0e1de6e8e26887d8a2832105828e5c983ac00426fc6aee50e54a5972516576d74839b3def15e7c49c1faff1d0b9e91c666cfece0b7aca28632479ca7a6d64769e9c275f55e60722e1becc8f71bc5e1cf8c22f0b72bd7e6607b1f073d13a25a840c7cbdfbeb867b6359e1b03c3bd794704e4d4ab9194871fa025717bbb90e659e7b1cc42d4920f6098816031eeb5e0253338c7a3e63e5306bdaa26ac9560b55c9c9bf6705049e868735c6afd134568397ca7b7442483589298607c3a4ba365609989f4d3ae26a537b601edf6ad3fd5e03f33aa014a63eb5afbeee9f70477e426f733441e67db3f5792cb8b118b8724e10d766736e96cc21887ed7384e9d1a0c7b3098d823b38084583376dd6c2274443156afa0abe0779bedc34bb0a27a25bac335e01c93cece8fc56fada1644821e4b59e6e83cce06ed69ac93e76292d113ac43118538556034b03942f5e64a9a386b9a8d15f450e386de5c2d2d55c04f7b59bc8d243703aa999d776aa22bdc268663ba917aa2defc09222e4ff7bd8669a2e1407cb2272bbd4013d4d44135d9b194f7daf28d0b9a3cd054b10113143ba8d21e7b718a8e4a26c594e82e4610af724d5e7c8fa0c9377d966077a8503f64ae235d3f86e628e356143eb0bd52bfbd89a3b684ebd08c8bb4fd86dffda189309821cfcaf2bf66006905d85654a863db4ab7a7d7d92e2c5191e2dd642de3b29372ad22ac72beb46937f852bc8d6a1102f8e54d94cfab4e9b5a418da7a1a3b1417737ad617e9463011b2d39cf3d6dbf6b91bf1c5d596574a5c4b4211c6cb006cdeec2abefcf355f706b9f642d1e3e2b7ab93ef14e7e4816cadbcbf2a96e451b55dce3f84c78fba31ad86011068e3e857da619ff05bcd093feb290a7f21d02c8423394fbe655cf69b7c6c1a641de40c7777085094d3e4bbda2f5e5a4374e9fbca33d2732940251e2f1a15eb1137d9185d099c5cae1aa7dfd4bc88dcc46d9a2184ad51a8d26476e5f829e33ccff93ab13fddef52842143178bd6a75b56421390d4fa4e38b68512da41e9b1496083f2f8f3f10bd54089195a5a5546fc3837c013ec391a65342cd497f7539f9563acf2af7f8fcab2ac964b7e338c1c991b239c8b6b467587fd789a25a744191f78e959751f1175877e00c7fdec7ec752927b83571374fb8b74fa278cd4fe41c46eca87d3c8ef2d0d02157061ecb33842652a1a327fd1b80f2fadb00844ed2214f2a174507429a20f8634782baaa94963d46c2996528d9534c5e07860c80e6afe6a1cc34464a607fede2cf919e6fa42f6d392841d3998a1dc91bd377a01dd7a61fe62c35ea56dba8c1bfa9f6a1c6787fbbde40d352d54cf3815806e281a8e4660437e8047e3ed138d41fa0ea4d5c8bc1611bf650327da0bf35a4f43c5d35fe7e4a8aa55712bfe49cbe7df55cc7e1efefc6971c536a37112f38c6931fdfcc6ae858f1ca8db0b010ef23e3e39680fc0c9971fe8a0f8ea51b59ebb0b08d9b394d00794f05f98640581edd6aa7152e0e72c770f5301ec8e912e72269a0738047ccc5cc7ecf1b11bceef68f907ecec95e32c28173cf5a11ae3c157c43e00b6f56c48541b4bdb2a51fe26914c1a62a9cdf8f60c8f0cdc9877f79478277f7aa83d5d8cd667bb38204f6e7f6b0a6c47b2bd13407cc5351d302350c0c6ebc182f020a0f095d8c7754bb8cd87c6b4763e9417be9c94f8e2c488bc639d4f539bb4c117a278a86491cc651f8ee4bf93e289ae034388b582239b047b2d2cc1f2aef09a1131d32033f5cbec7a302a90d74efb1de521ba2b6992961fa4fe61630c0ced84e6940a0024429a12404fcdc11e344916ba85a362f3193e2d786cb9e156a5142191f30d89904aa9e0d6d9a439bffe2284a06af02649b8813492a24e3862e984c34ca2308d0b024bf5dd8a667efb3fe4618d4b78f49497f0edfa26342385cd9fd44035889fc519ec6530d5a66dee1fac344311f56387a7d74660d7762409e64009ede7086ef5d881eba9ed7f0288ef7d572704b02f51eb025b953ae9f45531e91cb10ee7bf374d08e61f406dd2dc6c337fb358e365cfe309e51d70dca764748e838149c38f366d3348b25e732373cbc76f7a51164d049e381ef2a4c3ba900c5351ac7e31f2d255680fba731c0aeefbc8d7946438a6b2b80305752c0ccc5e0eb8fcfb6f83a89e3ce14b8d6f7a7d6d9b6709ec6e9fb7f43177b7770f77e3517c6c6394f0e5e6d18361221a9bf9fbdb6559f9ea5e092f48f54dd1cad2cd0e88f3b3f5e4884fa8c0af29bd22dc6e2617b8b602d23b9eaa0ec038ff76f07df2d83d3dd1382bd0f8113d630bef09186251bf35afa519dc98887602d6c6e6645178f6e96fd913298a63d7303b4bf2c54cce8b3930f11a6e17c1f7c5008cd85f959c801771d3e351880c53ac1e1a84a3e2fc421e8f0fed36fefc3cfe13c9d0a83200ed2328dbfbbcfea19b0d5bd3340228c1d71e5c7c7756529c12f5bb3046c69a92fe73f4cd07377e083cbe778d721fde16d7cf0074fcfaf727ff859b608b3a07dc61ebe988850a017e3803cbc2fce2b1328ca2d0bb97f48c9b62b59daf1abece19226c8ebc55070459b0a697465bbf1bc5eb1a7fa72db6781a6c87dc4f375dfcaacbff7b2bbd7e4d2514d1c801f573944d8411a9279eb3a94b66ceceab844f6a33054d9c96ec4bc2ec98e2893f44c18c372143e866db9ed4115f5aeb7898ea7f1775e0c792b2936ce33266d9a06b20244f9b8b89cad9496332e50bc2ed9a3b2836534e85d33197691a0dfda28af3575ad580e1a4cd4ce7e6100d3196444eb839a09c266ec4888cfc08e8a22ee9604e9641ad21664ac16f44a688d17e3359581c0f11d10c3384e64c3b1e0eaf98bf594f7a00459af98d2689690a8853b2776675000ff4801f5cbc224430d5a4ebce5e16640fd19f427beac9f4782d113cafa45735c110242a8f173af9deab67ec124e2299e081d6efc2a21b9281df994c0a165f18194cc6ede92098cd827c425f6b424ce863a393df64643105281a56f40eb1c1a2f6811d08bb4741d62ca24c3e2601ad05aa0f2a0b3694300464405988a72822f89384e8e94cc26057727165776294c5d4616fcb15abd1dc62311421bc6d69b927f38160120a721a026ca22eaf4bb042e0ec5620b171db962952fd64a308e63f88136219c0ae44f923730", 0x1000}, {&(0x7f0000001640)="ca119f8e63bdb78a12105721bbf69155db1b78d2b1cfa89645bc31be6c42d70f8a626974842d216919ca844002e8b87e854f5df9182298e5b0532dd0528a2e8665a52b71e8ef46d465ba86f32549f7583f05f038728ad9aff7a9c64f1d400554ec8662e542d8cab70e1a35dff89ebbeb2acd1210dd54ede1740aa4841096d0b5bd82d36e729b1b3d8d04888431ddccd99731eaed45d2c18e965d26908f3dd43d6cff45e45d74ca50d37d2a49bca5166ece42acf6228cb8f023afde0aafb96b547b2ee0e13033c06afc4dcdcef4ec0acc55f4f81d3dc9b7893e8f6e133f916173001a73d399ca8fec5b3bd80d13b4db2eeb5f3482e8", 0xf5}, {&(0x7f0000001740)="d44c83f0bec2cb974951d50dc0bc8f55f7266487e6e71b989dbb89fd9bdde8e1c0e0437d8f56fd43572014308a4d7c3d2c79ea827b9a1b7ac20dc79e5ce2603be0ab6a631a2b97edf432a76c1365f66664115301e9b6ce190900aeedd8d438cea42549111614e0fc41a420c24fd737efa34111546700759ad6ad777ff50611181cd1cc15caf129b080226e166a8decc04a0a9b4d0a4cbd461c0d82d2b67391e600b14895df7f9ab1bafd71e80639f97f3b35a5a861a308cf82e05b56e79f1cbbc3821a15003b673a51f8e0b5149089e3", 0xd0}, {&(0x7f0000001840)="fc0343790cba6daf75ad9e1153738825f4921ae2bef1247a33567bbffecc4fe2efb9aed24c901a4adbe56a564460799ea331d6963c48bbb9d57588423a13d492c8f6564d3d1978db0e5b4e515b7cfd9d8c9e3d5e45e4fb029ff94d38a6ff870354c0aa1dd4dfe99f4d478c6e245fcd9fb5a5658ed77ff01c8d0068f97ef542419a3a655c2651ecb3dd8db06fdbb6f6498393f3ac992aa88f12ab905e4adffb470407a769bc17b976d192f86d7cabd5007d963e10fffd4021fcac17702ae2a011cffd8270ae00dd1c863903739c1378daedd838d223eb477f", 0xd8}], 0x6, 0x7ffa, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ftruncate(r1, 0xe7b3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x113) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:21:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xfffffffb) 15:21:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, 0x0, 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xfffffff4) [ 2887.202118] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value 15:21:46 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:21:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xfffffffe) 15:21:46 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000001900)=[{&(0x7f00000002c0)="81", 0x1}, {&(0x7f0000000580)="37a9315c439359d069fa01e69ea3b3ce3cc76c520ae96140233985ae91a9762da5e5d8ebfb44d2d89993e64ff836babd6afb27769dfbfc14eab723ba92e891285d8ea391ab6b5beddb43409f24baea4c35b18b2ba3036a399c49170de69b16db24c6b54bd695fe9a2bd3034d2ebccc21468745605e89707e435666c05642ddc96120437a89cfa2e67a8476c32ff74060d11f84e7fc7eee999e3c19610f0de0ee04c8041763bc75600732b876fb25d46253fce366800e327be66ea88269c0c94c83755c44", 0xc4}, {&(0x7f0000000680)="e008faef8b7b1c3c30627eb43a06a84fdcf20ae8120462a9852a12c102", 0x1d}, {&(0x7f00000006c0)="dfcd927554be569fa20c27ac23bc7f88189b819494a679b43d1c35853efb3e753f5866db87f6a0629b653a79c7a1304245952f929af7f0d6f2792b96a9bfc0909314f97ac54a846d0b123b3fa5fb2ce4235519fdc1418e043d10a60931a3d610eb49cd9d6f6612dc65d69f856e5283ee454619396ef57c283b7f81d638f5e81e5105d9", 0x83}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="94555bdb00dba4d20d7ee0f8c19fd90c248da540bb8eadbd40e140e5f1f450b75a7c883d82657b284b2d493c12ad0b798bab4ec500c7da4bbd8574b6b02757f8d4a50b0969982609314713", 0x4b}, {&(0x7f0000001800)="0a3f5704591eee6c26c05e8db678431c316cc4f86ef41b36eb433ea95b8b6a5b74b8cf88a433dc90283379561f432062809b8714616ec87866376a73e0514ad870fa2ae3391dfcedba5d3c72fa3ecbb2206dbcbb83", 0x55}, {&(0x7f0000001880)="c7f5e66c6dd1c6713e1c13e17bf7078c2f7d78db4cf74e0de0f12510d41e71018e7cb7df484b342e9919ebb91d675643193a707df7010d19297287515bce23700b270a1817196a99b2780ef7105147eaba123fd85acb488c601c12159e74a764f37f34053b2eba389dd5a0", 0x6b}], 0x8, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x5, 0x0, 0x2, 0x0, 0x2, 0x3f, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000440)={'icmp6\x00'}, &(0x7f0000001980)=0x1e) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) pivot_root(&(0x7f0000000400)='./file2/file0\x00', &(0x7f0000000540)='./file2\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) chroot(&(0x7f0000000300)='./file1\x00') 15:21:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:46 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x8440, &(0x7f00000000c0)={'trans=unix,', {[{@debug={'debug', 0x3d, 0xff}}, {@cache_none}, {@aname={'aname', 0x3d, ':*%&\'&}-)'}}, {}, {@access_any}, {@cachetag={'cachetag', 0x3d, '%[}%'}}, {@access_uid={'access', 0x3d, r1}}, {@msize={'msize', 0x3d, 0x6}}], [{@pcr={'pcr', 0x3d, 0x26}}, {@fowner_lt={'fowner<', r2}}, {@fsmagic}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x64, 0x61, 0x33, 0x61, 0x65, 0x34, 0x64], 0x2d, [0x36, 0x65, 0x36, 0x35], 0x2d, [0x32, 0x31, 0x38, 0x31], 0x2d, [0x30, 0x37, 0x61, 0x64], 0x2d, [0x34, 0x32, 0x38, 0x35, 0x37, 0x32, 0x35, 0x30]}}}]}}) 15:21:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2900.340248] FAT-fs (loop3): bogus number of FAT sectors [ 2900.341204] FAT-fs (loop3): Can't find a valid FAT filesystem [ 2900.344775] FAT-fs (loop4): invalid media value (0x00) [ 2900.345432] FAT-fs (loop4): Can't find a valid FAT filesystem 15:21:46 executing program 1: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/55, 0x37, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x4e21, 0x1, @local, 0x7}, 0x1c) bind$802154_dgram(0xffffffffffffffff, &(0x7f00000005c0)={0x24, @short={0x2, 0x2, 0xaaa3}}, 0x14) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8020}) r1 = dup(r0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0xd, &(0x7f0000000080)={0x0, 0x0}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000700)=""/4096, &(0x7f0000001700)=0x1000) finit_module(r1, &(0x7f0000000040)='}$\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x448, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x6}}, @NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x6}, @NL80211_ATTR_SCAN_SUPP_RATES={0x400, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x6b, 0x2, "53e5aec46aeda688563257c9a1bcaf8bd1b7f7f75350c7923eab4fad1dca0e35395d5c056228b1be847c6885b061523dcb00f67888a631be5deca38ec3ea027be0e5aa1cc8c684690a795ab8500b13bfe3912cac429060df6b8400bfd9809ed409b793b432d8a6"}, @NL80211_BAND_60GHZ={0xdf, 0x2, "59c6a8d27ff4a22af61367854cb2793e49f55ac5a8525487cf3b6fff570461321151f6eac6b41fad8362ddb06340d0cdbcae6ef29ceaa52783c7bdaa760026983f4f5e4af69e4489b9b94f21ae35eae1dc0c4fa1873484edad528940e364d9ccaeb13931536ed1ff91b66b9274a4cdfadc57738efac1821c8fe4fb1f532ecc8d4ed7c8f42826aae8a88aefe8ebb6cd1052bffae0162066ad14a7a0b8d15223b5be1077f7f6f837ab2ae82e36ce74135fbfcf13105e04ac948217e9ee47dd91d7afbc68dae423af02320593e9580deb8b58b103d6a0eb93359f2dd7"}, @NL80211_BAND_6GHZ={0xf9, 0x3, "96b3ff32fccf13a9559008034fe32ee2d439404025dbc054d292333e7da0893d5f69068b9a8c1550f79f78fcf3583f4fff93c2825f8c18979beaac62fca319fbd7c99503cccdc7457e39ec19898812b9e23e4726f598f1c32dab972e0102c46c757a1e3beec0745fd489ed39c7086b1980d029d517cccd18d7d5c246f4ca6005fcdb8fe3c15f8aecdce3db75d7a3c3e757f9e66f0c3811d536042e545e38d041ed41a064c68b417ac6b66365206f496a93d5d99f8dc2497f9027d1ea6d7bb4d5c910fc3dca7edc7eac50fabd36ce4674e3ae6277b299aec9427c6c0a7ae5d3167d957bbf5c3239297acb83db92b99378a76421f5ee"}, @NL80211_BAND_2GHZ={0x70, 0x0, "de0442077da610ede1f4f275c03dbab861345d6d5eea98aef766bcb931abc360cdf1a0de6ea5f13837792c88e6103e82eb9a6a977299c76390fcb4c70f7b1be081a3b9918dca94b8fbe8334a55f8d650f1bf8d1b76b7ae3f1f95934bae89b247d2d9942578c6cf74d2372952"}, @NL80211_BAND_2GHZ={0xb1, 0x0, "8363417e32b2f020991ad4f75d9b8ea26132c152501d7842c2e1805d2175c03314555fc284e138492fc65cdb3ae0d70ab515de42c09b8eb9bb73b3e6676e252cf47eb0e0de8b0aee0f0838702c638bb8af99c9ddcc78e4167b02ceb2d606d44f57c0256a9730c2b72b2e08ec345e96037cf7ae1502d049b12a6534d4f111d875c12a890c8f3d4279c21e259a1fb1a820086b409c8d479fd67b7a83975cbf3aef5701025ebc30548f089a16790e"}, @NL80211_BAND_6GHZ={0x90, 0x3, "21426bbe0327de2b6466b22d0f157911a5514c753ea6489ddc36319aed01140e6725e111cbec70959f185af3cbdf2b0e50f13e6e7b1b730b2259c348a40e8c7b94aa99c9f3cc810cd52d76f4ad5f7f2c5a3cd098dddb2f55a17db1dea6f5a5a3cd34e5e6424b3c36b291c89cfd0f3b5d239a3aed5dd220814ee40244f44dd9e82b810dede49922daefc13896"}]}, @NL80211_ATTR_IE={0xc, 0x2a, [@mesh_id={0x72, 0x6}]}, @NL80211_ATTR_BSSID={0xa}]}, 0x448}, 0x1, 0x0, 0x0, 0x240000d0}, 0x4011) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x24500, 0x0) 15:21:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x70000000000) 15:21:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:46 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0x3}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) creat(&(0x7f0000000400)='./file2\x00', 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(r0, &(0x7f0000000580)='./file1\x00', 0x105942, 0xb9) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) mknod$loop(&(0x7f0000000540)='./file0\x00', 0x20, 0x0) chroot(&(0x7f0000000300)='./file1\x00') 15:21:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:46 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2900.589182] FAT-fs (loop4): invalid media value (0x00) [ 2900.589824] FAT-fs (loop4): Can't find a valid FAT filesystem 15:21:46 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:46 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) openat(0xffffffffffffffff, &(0x7f0000000400)='\x00', 0x80, 0x0) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000540)={0x0, r0, 0xd30, 0x7, 0x8, 0x3}) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') [ 2900.715448] FAT-fs (loop7): invalid media value (0x00) [ 2900.716042] FAT-fs (loop7): Can't find a valid FAT filesystem [ 2900.836274] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value 15:21:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:21:59 executing program 1: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/55, 0x37, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x4e21, 0x1, @local, 0x7}, 0x1c) bind$802154_dgram(0xffffffffffffffff, &(0x7f00000005c0)={0x24, @short={0x2, 0x2, 0xaaa3}}, 0x14) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8020}) r1 = dup(r0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0xd, &(0x7f0000000080)={0x0, 0x0}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000700)=""/4096, &(0x7f0000001700)=0x1000) finit_module(r1, &(0x7f0000000040)='}$\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x448, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x6}}, @NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x6}, @NL80211_ATTR_SCAN_SUPP_RATES={0x400, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x6b, 0x2, "53e5aec46aeda688563257c9a1bcaf8bd1b7f7f75350c7923eab4fad1dca0e35395d5c056228b1be847c6885b061523dcb00f67888a631be5deca38ec3ea027be0e5aa1cc8c684690a795ab8500b13bfe3912cac429060df6b8400bfd9809ed409b793b432d8a6"}, @NL80211_BAND_60GHZ={0xdf, 0x2, "59c6a8d27ff4a22af61367854cb2793e49f55ac5a8525487cf3b6fff570461321151f6eac6b41fad8362ddb06340d0cdbcae6ef29ceaa52783c7bdaa760026983f4f5e4af69e4489b9b94f21ae35eae1dc0c4fa1873484edad528940e364d9ccaeb13931536ed1ff91b66b9274a4cdfadc57738efac1821c8fe4fb1f532ecc8d4ed7c8f42826aae8a88aefe8ebb6cd1052bffae0162066ad14a7a0b8d15223b5be1077f7f6f837ab2ae82e36ce74135fbfcf13105e04ac948217e9ee47dd91d7afbc68dae423af02320593e9580deb8b58b103d6a0eb93359f2dd7"}, @NL80211_BAND_6GHZ={0xf9, 0x3, "96b3ff32fccf13a9559008034fe32ee2d439404025dbc054d292333e7da0893d5f69068b9a8c1550f79f78fcf3583f4fff93c2825f8c18979beaac62fca319fbd7c99503cccdc7457e39ec19898812b9e23e4726f598f1c32dab972e0102c46c757a1e3beec0745fd489ed39c7086b1980d029d517cccd18d7d5c246f4ca6005fcdb8fe3c15f8aecdce3db75d7a3c3e757f9e66f0c3811d536042e545e38d041ed41a064c68b417ac6b66365206f496a93d5d99f8dc2497f9027d1ea6d7bb4d5c910fc3dca7edc7eac50fabd36ce4674e3ae6277b299aec9427c6c0a7ae5d3167d957bbf5c3239297acb83db92b99378a76421f5ee"}, @NL80211_BAND_2GHZ={0x70, 0x0, "de0442077da610ede1f4f275c03dbab861345d6d5eea98aef766bcb931abc360cdf1a0de6ea5f13837792c88e6103e82eb9a6a977299c76390fcb4c70f7b1be081a3b9918dca94b8fbe8334a55f8d650f1bf8d1b76b7ae3f1f95934bae89b247d2d9942578c6cf74d2372952"}, @NL80211_BAND_2GHZ={0xb1, 0x0, "8363417e32b2f020991ad4f75d9b8ea26132c152501d7842c2e1805d2175c03314555fc284e138492fc65cdb3ae0d70ab515de42c09b8eb9bb73b3e6676e252cf47eb0e0de8b0aee0f0838702c638bb8af99c9ddcc78e4167b02ceb2d606d44f57c0256a9730c2b72b2e08ec345e96037cf7ae1502d049b12a6534d4f111d875c12a890c8f3d4279c21e259a1fb1a820086b409c8d479fd67b7a83975cbf3aef5701025ebc30548f089a16790e"}, @NL80211_BAND_6GHZ={0x90, 0x3, "21426bbe0327de2b6466b22d0f157911a5514c753ea6489ddc36319aed01140e6725e111cbec70959f185af3cbdf2b0e50f13e6e7b1b730b2259c348a40e8c7b94aa99c9f3cc810cd52d76f4ad5f7f2c5a3cd098dddb2f55a17db1dea6f5a5a3cd34e5e6424b3c36b291c89cfd0f3b5d239a3aed5dd220814ee40244f44dd9e82b810dede49922daefc13896"}]}, @NL80211_ATTR_IE={0xc, 0x2a, [@mesh_id={0x72, 0x6}]}, @NL80211_ATTR_BSSID={0xa}]}, 0x448}, 0x1, 0x0, 0x0, 0x240000d0}, 0x4011) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x24500, 0x0) 15:21:59 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') fcntl$setflags(r0, 0x2, 0x1) write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) setxattr$incfs_metadata(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)="356e9b43e6221e1dee52bd3918d778ca6037dab26980937937b372041cd138ceca7833ff5d05fca57726fa73991c0667011b7e2f6baf8b4a55b3a52af093711f2b2379d65b05ebc1dc2cea011e0f359af596577b17b2b8d20dc5de7ede0d5250d64d042cfb947064e1a74930ec2f6ad7ae6679c4a4a652", 0x77, 0x6) chroot(&(0x7f0000000300)='./file1\x00') 15:21:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}, {&(0x7f0000000540)="663137f88af4df8a5d53278671e7dcd7d2de40c218ca5a27ded595925505f11c5c45d0a6c0d1b6d86ef16a9888eaacce668316be2deb433184c7244b1a3a0b2246c7e2e19161c0", 0x47, 0x4e}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000400)={0x3}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:21:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:59 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:21:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xffffffff000) 15:21:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2913.759106] FAT-fs (loop4): bogus number of FAT sectors [ 2913.759836] FAT-fs (loop4): Can't find a valid FAT filesystem 15:21:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, 0x0) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x800800000000) 15:22:13 executing program 1: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/55, 0x37, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x4e21, 0x1, @local, 0x7}, 0x1c) bind$802154_dgram(0xffffffffffffffff, &(0x7f00000005c0)={0x24, @short={0x2, 0x2, 0xaaa3}}, 0x14) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8020}) r1 = dup(r0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0xd, &(0x7f0000000080)={0x0, 0x0}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000700)=""/4096, &(0x7f0000001700)=0x1000) finit_module(r1, &(0x7f0000000040)='}$\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x448, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x6}}, @NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x6}, @NL80211_ATTR_SCAN_SUPP_RATES={0x400, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x6b, 0x2, "53e5aec46aeda688563257c9a1bcaf8bd1b7f7f75350c7923eab4fad1dca0e35395d5c056228b1be847c6885b061523dcb00f67888a631be5deca38ec3ea027be0e5aa1cc8c684690a795ab8500b13bfe3912cac429060df6b8400bfd9809ed409b793b432d8a6"}, @NL80211_BAND_60GHZ={0xdf, 0x2, "59c6a8d27ff4a22af61367854cb2793e49f55ac5a8525487cf3b6fff570461321151f6eac6b41fad8362ddb06340d0cdbcae6ef29ceaa52783c7bdaa760026983f4f5e4af69e4489b9b94f21ae35eae1dc0c4fa1873484edad528940e364d9ccaeb13931536ed1ff91b66b9274a4cdfadc57738efac1821c8fe4fb1f532ecc8d4ed7c8f42826aae8a88aefe8ebb6cd1052bffae0162066ad14a7a0b8d15223b5be1077f7f6f837ab2ae82e36ce74135fbfcf13105e04ac948217e9ee47dd91d7afbc68dae423af02320593e9580deb8b58b103d6a0eb93359f2dd7"}, @NL80211_BAND_6GHZ={0xf9, 0x3, "96b3ff32fccf13a9559008034fe32ee2d439404025dbc054d292333e7da0893d5f69068b9a8c1550f79f78fcf3583f4fff93c2825f8c18979beaac62fca319fbd7c99503cccdc7457e39ec19898812b9e23e4726f598f1c32dab972e0102c46c757a1e3beec0745fd489ed39c7086b1980d029d517cccd18d7d5c246f4ca6005fcdb8fe3c15f8aecdce3db75d7a3c3e757f9e66f0c3811d536042e545e38d041ed41a064c68b417ac6b66365206f496a93d5d99f8dc2497f9027d1ea6d7bb4d5c910fc3dca7edc7eac50fabd36ce4674e3ae6277b299aec9427c6c0a7ae5d3167d957bbf5c3239297acb83db92b99378a76421f5ee"}, @NL80211_BAND_2GHZ={0x70, 0x0, "de0442077da610ede1f4f275c03dbab861345d6d5eea98aef766bcb931abc360cdf1a0de6ea5f13837792c88e6103e82eb9a6a977299c76390fcb4c70f7b1be081a3b9918dca94b8fbe8334a55f8d650f1bf8d1b76b7ae3f1f95934bae89b247d2d9942578c6cf74d2372952"}, @NL80211_BAND_2GHZ={0xb1, 0x0, "8363417e32b2f020991ad4f75d9b8ea26132c152501d7842c2e1805d2175c03314555fc284e138492fc65cdb3ae0d70ab515de42c09b8eb9bb73b3e6676e252cf47eb0e0de8b0aee0f0838702c638bb8af99c9ddcc78e4167b02ceb2d606d44f57c0256a9730c2b72b2e08ec345e96037cf7ae1502d049b12a6534d4f111d875c12a890c8f3d4279c21e259a1fb1a820086b409c8d479fd67b7a83975cbf3aef5701025ebc30548f089a16790e"}, @NL80211_BAND_6GHZ={0x90, 0x3, "21426bbe0327de2b6466b22d0f157911a5514c753ea6489ddc36319aed01140e6725e111cbec70959f185af3cbdf2b0e50f13e6e7b1b730b2259c348a40e8c7b94aa99c9f3cc810cd52d76f4ad5f7f2c5a3cd098dddb2f55a17db1dea6f5a5a3cd34e5e6424b3c36b291c89cfd0f3b5d239a3aed5dd220814ee40244f44dd9e82b810dede49922daefc13896"}]}, @NL80211_ATTR_IE={0xc, 0x2a, [@mesh_id={0x72, 0x6}]}, @NL80211_ATTR_BSSID={0xa}]}, 0x448}, 0x1, 0x0, 0x0, 0x240000d0}, 0x4011) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x24500, 0x0) 15:22:13 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/55, 0x37, 0x0) getsockopt$WPAN_SECURITY_LEVEL(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000400), &(0x7f0000000540)=0x4) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:22:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000400), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') [ 2927.834195] FAT-fs (loop6): bogus number of reserved sectors [ 2927.835605] FAT-fs (loop6): Can't find a valid FAT filesystem [ 2927.850462] FAT-fs (loop4): bogus number of FAT sectors [ 2927.851664] FAT-fs (loop4): Can't find a valid FAT filesystem 15:22:13 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) [ 2928.030988] FAT-fs (loop6): Unrecognized mount option "./file2" or missing value [ 2928.067113] FAT-fs (loop4): bogus number of FAT sectors [ 2928.068481] FAT-fs (loop4): Can't find a valid FAT filesystem 15:22:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x1000000000000) 15:22:13 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, 0x0) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:14 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000540)) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:22:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0xffffff09, 0x81, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:22:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:14 executing program 1: syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/55, 0x37, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x4e21, 0x1, @local, 0x7}, 0x1c) bind$802154_dgram(0xffffffffffffffff, &(0x7f00000005c0)={0x24, @short={0x2, 0x2, 0xaaa3}}, 0x14) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8020}) r1 = dup(r0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0xd, &(0x7f0000000080)={0x0, 0x0}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000700)=""/4096, &(0x7f0000001700)=0x1000) finit_module(r1, &(0x7f0000000040)='}$\x00', 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x448, 0x0, 0x10, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x6}}, @NL80211_ATTR_BSSID={0xa}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x6}, @NL80211_ATTR_SCAN_SUPP_RATES={0x400, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x6b, 0x2, "53e5aec46aeda688563257c9a1bcaf8bd1b7f7f75350c7923eab4fad1dca0e35395d5c056228b1be847c6885b061523dcb00f67888a631be5deca38ec3ea027be0e5aa1cc8c684690a795ab8500b13bfe3912cac429060df6b8400bfd9809ed409b793b432d8a6"}, @NL80211_BAND_60GHZ={0xdf, 0x2, "59c6a8d27ff4a22af61367854cb2793e49f55ac5a8525487cf3b6fff570461321151f6eac6b41fad8362ddb06340d0cdbcae6ef29ceaa52783c7bdaa760026983f4f5e4af69e4489b9b94f21ae35eae1dc0c4fa1873484edad528940e364d9ccaeb13931536ed1ff91b66b9274a4cdfadc57738efac1821c8fe4fb1f532ecc8d4ed7c8f42826aae8a88aefe8ebb6cd1052bffae0162066ad14a7a0b8d15223b5be1077f7f6f837ab2ae82e36ce74135fbfcf13105e04ac948217e9ee47dd91d7afbc68dae423af02320593e9580deb8b58b103d6a0eb93359f2dd7"}, @NL80211_BAND_6GHZ={0xf9, 0x3, "96b3ff32fccf13a9559008034fe32ee2d439404025dbc054d292333e7da0893d5f69068b9a8c1550f79f78fcf3583f4fff93c2825f8c18979beaac62fca319fbd7c99503cccdc7457e39ec19898812b9e23e4726f598f1c32dab972e0102c46c757a1e3beec0745fd489ed39c7086b1980d029d517cccd18d7d5c246f4ca6005fcdb8fe3c15f8aecdce3db75d7a3c3e757f9e66f0c3811d536042e545e38d041ed41a064c68b417ac6b66365206f496a93d5d99f8dc2497f9027d1ea6d7bb4d5c910fc3dca7edc7eac50fabd36ce4674e3ae6277b299aec9427c6c0a7ae5d3167d957bbf5c3239297acb83db92b99378a76421f5ee"}, @NL80211_BAND_2GHZ={0x70, 0x0, "de0442077da610ede1f4f275c03dbab861345d6d5eea98aef766bcb931abc360cdf1a0de6ea5f13837792c88e6103e82eb9a6a977299c76390fcb4c70f7b1be081a3b9918dca94b8fbe8334a55f8d650f1bf8d1b76b7ae3f1f95934bae89b247d2d9942578c6cf74d2372952"}, @NL80211_BAND_2GHZ={0xb1, 0x0, "8363417e32b2f020991ad4f75d9b8ea26132c152501d7842c2e1805d2175c03314555fc284e138492fc65cdb3ae0d70ab515de42c09b8eb9bb73b3e6676e252cf47eb0e0de8b0aee0f0838702c638bb8af99c9ddcc78e4167b02ceb2d606d44f57c0256a9730c2b72b2e08ec345e96037cf7ae1502d049b12a6534d4f111d875c12a890c8f3d4279c21e259a1fb1a820086b409c8d479fd67b7a83975cbf3aef5701025ebc30548f089a16790e"}, @NL80211_BAND_6GHZ={0x90, 0x3, "21426bbe0327de2b6466b22d0f157911a5514c753ea6489ddc36319aed01140e6725e111cbec70959f185af3cbdf2b0e50f13e6e7b1b730b2259c348a40e8c7b94aa99c9f3cc810cd52d76f4ad5f7f2c5a3cd098dddb2f55a17db1dea6f5a5a3cd34e5e6424b3c36b291c89cfd0f3b5d239a3aed5dd220814ee40244f44dd9e82b810dede49922daefc13896"}]}, @NL80211_ATTR_IE={0xc, 0x2a, [@mesh_id={0x72, 0x6}]}, @NL80211_ATTR_BSSID={0xa}]}, 0x448}, 0x1, 0x0, 0x0, 0x240000d0}, 0x4011) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x24500, 0x0) 15:22:27 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) openat(0xffffffffffffffff, &(0x7f0000000400)='\x00', 0x80, 0x0) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000540)={0x0, r0, 0xd30, 0x7, 0x8, 0x3}) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:22:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file2\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1d8b69c9}], 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="9306008d6ec104006cd438f9bb1f94f1026680c6ce9700af8217b1389800"/44, @ANYRES64]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x2, 0x2}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)={0x0, 0x1, 0x1, 0x538}) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:22:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, 0x0) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:27 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x10001}], 0x8000, &(0x7f0000000540)=ANY=[@ANYRES16, @ANYBLOB="15c5f7c873924655e814ec293e7e786db6f9ed7da069c04080d69a6a4acb930891cc026e7f20da74722b48947ee0b8c40fe4195ea73e2ea638c0b8456527672a044eb97e04b356d53129dec0752f9954c5445e34ae60bb896166ff0b6c05c0e9af6c8e0d1fa24760a33b0a83e598582bec8c5c11cc3652b05a7fe52ab94d1611789a2a8d42cb1ffa35137663007e73d7ca48955a621f659d93afa82c07c3b212fd9b01fea59e1937cad195e66de6526fec58af8f279e5066b560f5d5c8fb4b0648b1487024ef07c5e54d6247fcb3d5b19d387ff95918cefa8a5780b8ac174d", @ANYRES32]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000003c0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) lseek(0xffffffffffffffff, 0x7, 0x1) mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x46a88, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x76}, 0x0, 0xffffffffffffff7f, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f34a069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:22:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x8000000000000) [ 2942.028312] FAT-fs (loop6): Unrecognized mount option "“" or missing value 15:22:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:28 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) openat(0xffffffffffffffff, &(0x7f0000000400)='\x00', 0x80, 0x0) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000540)={0x0, r0, 0xd30, 0x7, 0x8, 0x3}) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') [ 2942.187489] FAT-fs (loop6): Unrecognized mount option "“" or missing value 15:22:28 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(0x0, 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000200)='./file1\x00', 0x2) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18, r2, {r0}}, './file1\x00'}) r4 = openat(r3, &(0x7f00000002c0)='./file1\x00', 0x7543, 0x108) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r4, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) chroot(&(0x7f0000000300)='./file1\x00') 15:22:28 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xa000000000000) 15:22:28 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) clone3(&(0x7f00000006c0)={0xc093280ec8fd5b9b, &(0x7f0000000000), &(0x7f0000000440)=0x0, &(0x7f00000005c0), {0x10}, &(0x7f0000000600)=""/47, 0x2f, &(0x7f0000000640)=""/19, &(0x7f0000000680)=[0x0, 0x0], 0x2, {r1}}, 0x58) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x40, 0x3f, 0x3, 0x0, 0x0, 0x7, 0x18000, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffc00, 0x2, @perf_config_ext={0x2, 0x1}, 0x221d, 0xf458, 0x1, 0x2, 0x9, 0x9, 0x0, 0x0, 0x66eb, 0x0, 0x7ff}, r4, 0x7, 0xffffffffffffffff, 0x9) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:22:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:44 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) openat(0xffffffffffffffff, &(0x7f0000000400)='\x00', 0x80, 0x0) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000540)={0x0, r0, 0xd30, 0x7, 0x8, 0x3}) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:22:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x10000000000000) 15:22:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x42) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000400)='./file2\x00', 0x5d) openat(r3, &(0x7f0000000540)='./file2\x00', 0x143000, 0x60) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:22:44 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:44 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(0x0, 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x716d}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:22:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:44 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) dup2(r0, r1) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:22:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:22:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(0x0, 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') ioctl$BTRFS_IOC_SNAP_CREATE(0xffffffffffffffff, 0x50009401, &(0x7f0000000540)={{r1}, "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"}) dup2(r1, r0) write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:22:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x80000000000000) 15:22:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) fadvise64(0xffffffffffffffff, 0x6, 0x10000, 0x5) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:22:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:58 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x8, r2, &(0x7f00000000c0)="7467aed62b72a650ad7fd89735c3ee9a8f212ff9ffa781f45a530d6f8d86f9bdfa948c66ce97e966c2fbeb17663002e4e2", 0x31, 0x1b1, 0x0, 0x2, r0}]) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) io_submit(r1, 0x2, &(0x7f00000002c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x8, 0x0, r3, &(0x7f0000000000)="02caec85083626b4", 0x8}]) 15:22:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105102, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000540)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:22:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, 0x0, 0x0) 15:22:58 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_keymap_exec_t:s0\x00', 0x28) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "4fa2f8201eed6e500c32342a227989f18a88ab65bad4c23a441d66f462f1df77bc777d160562da8c50431b2a204f36c6ed27b00215909d75417aa68c9029c5fd", "176764fe8c2ff71a1633d53dafbecd823af97cf5831be9a6fed5449e9f77dd92"}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f00000000c0), &(0x7f0000000180)) r1 = syz_open_procfs(0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000002c0), 0x2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x1000000, 0x10, r1, 0x10000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="64656c616c6c6f632c001d3faee579ccd7241d9804a591491c16e592bcb9bb335f8c0b12611c27da8dfc43cd720d6e80a7ca7dd46ba6256705353d673e8f96d1f8c8cfd8eb353d2188a91f6c1b7036ea798172062554f964dd5a2eb96a018000000000000015a88e8a72985b3c8276e1e1765995f802f3f2481081848a6ad9de3b8b3471dba02f811ee008f85ebb0db73347dc0000004fa116b903d48e3d7cb70d"]) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r2) io_uring_enter(r2, 0x50bc, 0xa44f, 0x0, &(0x7f0000000200)={[0x7]}, 0x8) 15:22:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:22:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000580)='./file0/file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x180) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000540)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="812e2f93696c653100"]) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000400)='./file2\x00') chroot(&(0x7f0000000300)='./file1\x00') 15:22:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xf0ffffff0f0000) 15:22:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:22:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, 0x0, 0x0) 15:22:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x2, 0x8000}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r5 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000100)='syz_tun\x00') perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x80, 0xff, 0xad, 0x3, 0x7f, 0x0, 0x20, 0x2, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9ea, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x1000, 0x9, 0x8, 0x4ba15d9ecd060c42, 0x10001, 0x101, 0x8000, 0x0, 0x8, 0x0, 0x4}, r5, 0xb, r5, 0x2) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007f8ffffc3048f01000000001c00000000000000000000951f000000", @ANYRES32=r4], 0x38}}], 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) r6 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xa4482}, 0x18) clock_gettime(0x0, &(0x7f0000001c40)={0x0, 0x0}) recvmmsg(r5, &(0x7f0000001e00)=[{{&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000400)=""/209, 0xd1}, {&(0x7f0000000580)=""/226, 0xe2}, {&(0x7f0000000680)=""/253, 0xfd}, {&(0x7f0000000300)=""/66, 0x42}], 0x4, &(0x7f0000000780)=""/247, 0xf7}, 0x8}, {{&(0x7f0000000880)=@phonet, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000900)=""/16, 0x10}, {&(0x7f0000000940)=""/63, 0x3f}, {&(0x7f0000000980)=""/170, 0xaa}, {&(0x7f0000000a40)=""/5, 0x5}, {&(0x7f0000000a80)=""/197, 0xc5}, {&(0x7f0000000b80)=""/194, 0xc2}, {&(0x7f0000000c80)=""/46, 0x2e}, {&(0x7f0000000cc0)=""/76, 0x4c}], 0x8, &(0x7f0000000dc0)=""/158, 0x9e}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e80)}, {&(0x7f0000000ec0)=""/11, 0xb}, {&(0x7f0000000f00)=""/133, 0x85}, {&(0x7f0000000fc0)}], 0x4, &(0x7f0000001040)=""/181, 0xb5}, 0x3ff}, {{&(0x7f0000001100)=@tipc, 0x80, &(0x7f0000001200)=[{&(0x7f0000001180)=""/90, 0x5a}], 0x1}, 0x10001}, {{&(0x7f0000001240)=@sco={0x1f, @none}, 0x80, &(0x7f0000001400)=[{&(0x7f00000012c0)=""/83, 0x53}, {&(0x7f0000001340)=""/125, 0x7d}, {&(0x7f0000002080)=""/4096, 0x1000}, {&(0x7f00000013c0)}], 0x4}, 0x5}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000001440)=""/89, 0x59}, {&(0x7f0000003080)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/157, 0x9d}, {&(0x7f0000001680)=""/199, 0xc7}, {&(0x7f0000001580)=""/87, 0x57}, {&(0x7f0000001780)=""/212, 0xd4}, {&(0x7f0000001880)=""/198, 0xc6}, {&(0x7f0000004080)=""/4096, 0x1000}], 0x8, &(0x7f0000001a00)=""/20, 0x14}, 0xb4}, {{&(0x7f0000001a40)=@ax25={{0x3, @rose}, [@netrom, @remote, @netrom, @default, @rose, @default, @rose, @default]}, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001ac0)=""/113, 0x71}], 0x1, &(0x7f0000001b80)=""/170, 0xaa}, 0x63d}], 0x7, 0x12003, &(0x7f0000001c80)={r7, r8+60000000}) ioctl$TUNGETSNDBUF(r6, 0x800454d3, &(0x7f0000000180)) [ 2972.771713] FAT-fs (loop6): Unrecognized mount option "./file2" or missing value [ 2972.781182] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value 15:22:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x100000000000000) 15:22:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x543, 0x0) close(r0) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file1/file0\x00', 0x2, 0x3, &(0x7f0000000480)=[{&(0x7f0000000380)="bfff4c5228a20e9f87dc593814b281e7508df5e7006007ad75c0aaf897c058cf94444d23ff9c5b20754680a1422fef98527daeb18835c17d5c08dbb0420e234df09586096bd14235ac51afdc6d1c0ec47d2eaa26f684842a3613a40a66d746edcf82ab305e9130a0199e35cd4a95929332cdaca9fd905e5b251fbd481cd705bf84a0c261f1865124b7701e9ff198ca8e9014db27d04a7a4e22690341fd53d6025232577177a8cfd16339eba5962baf922cfdb95cdae3c80051e87ea14cca10c61a4e22123cf61deedadac395a44306b29331f0560bd9bae847aafcb2c7b509ebcbcec7e0120e81b7209ca713d597e08a57349daf", 0xf4}, {&(0x7f0000000940)="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", 0x1000, 0xb6}, {&(0x7f0000000240)="2683e3a08b2ed4f71595721fef6adbd78840d79cbee9e575b6d1606e7c03342a2cb295b8519e5b75ced13f21475bacec84ecb8d9cf82c6e61b99a7cccf84a4d241b9b02f468a7f330dc3852f9b6435011565d32c8a6faaefdeba9dca54b14b47769cb665ec9b96aa504b7a80b96d", 0x6e, 0x4}], 0x2008002, &(0x7f0000000500)={[{@dax}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@norecovery}, {@nodelalloc}], [{@obj_role={'obj_role', 0x3d, '*(\''}}]}) faccessat2(r1, &(0x7f00000000c0)='./file1\x00', 0x10e, 0x1000) socket$inet6_tcp(0xa, 0x1, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = epoll_create1(0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x4e23, 0x5, @remote, 0x52b3}}, 0x0, 0x0, 0x3f, 0x0, "d0bcdbcea746f58434e9fb124d712b2242811ae37f3ffd21a6353ea7a7b55d0e6c84c084a5be242921f0402418bfe5aed4c26c5e47654849a57b2e9fe8b3a4f44d04a78afa9a0285c5338374f8ffb13a"}, 0xd8) mount$9p_fd(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000300), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) sendmsg$nl_generic(r0, &(0x7f0000000600)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, 0x18, 0x800, 0x70bd29, 0x25dfdbfd, {0x1a}, [@typed={0xc, 0x6e, 0x0, 0x0, @u64=0x3ff}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4000840) 15:22:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:23:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, 0x0, 0x0) 15:23:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x200000000000000) 15:23:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x29, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}, {&(0x7f0000000dc0)="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", 0xad2, 0x393}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x80000, 0x0) openat(0xffffffffffffffff, 0x0, 0x111000, 0x0) mknodat$loop(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) mknodat$loop(0xffffffffffffffff, &(0x7f0000000d80)='./file0\x00', 0xc000, 0x1) chmod(&(0x7f0000000d00)='./file1\x00', 0x80) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x102c0, 0x64) faccessat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_config_ext={0x200000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) 15:23:12 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:12 executing program 7: syz_mount_image$vfat(&(0x7f0000001940), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r2, &(0x7f0000001900)={&(0x7f0000000540)=@pppol2tpin6, 0x80, &(0x7f0000001800)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/139, 0x8b}, {&(0x7f0000001680)=""/85, 0x55}, {&(0x7f0000001700)=""/242, 0xf2}], 0x5, &(0x7f0000001880)=""/68, 0x44}, 0x101) rmdir(&(0x7f0000000400)='./file2\x00') ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:23:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:23:12 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:12 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000400)='\x00', 0x2) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x982018, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1e, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540), 0xb}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x1002, 0x7}, 0x0, 0xffffffffffffffff, r0, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000580)='./file2\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) sendfile(0xffffffffffffffff, r1, &(0x7f0000000200)=0x4b0e, 0x80000001) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:23:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:23:27 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file3\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:23:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x201000000000000) 15:23:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5c, 0xa0050, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x30) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000640)={'syztnl2\x00', &(0x7f00000005c0)={'sit0\x00', 0x0, 0x2f, 0x80, 0xc, 0xffffffca, 0x21, @remote, @rand_addr=' \x01\x00', 0x1, 0x20, 0x1, 0x1}}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:23:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:23:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:23:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:23:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:23:27 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:27 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:23:27 executing program 6: sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x1c, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x40) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {0x3}, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:23:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x300000000000000) [ 3002.121860] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value 15:23:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x400000000000000) 15:23:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:23:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x0, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000003c0)=[r1, 0xffffffffffffffff], 0x2) recvmmsg$unix(r1, &(0x7f0000003900)=[{{&(0x7f0000000000)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/122, 0x7a}, {&(0x7f0000000240)=""/119, 0x77}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x3, &(0x7f0000001b80)=ANY=[@ANYBLOB="200000de7394b6af1759a00001000004", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX, @ANYBLOB="180000ffffffff000100000003000000fc7f953f88e73f05ce8d7521949ea3693f186cefb609bf2087472181a72a6fb4d3ed1a25a74f4cb733c27734f23535dacfbc7050ab607a0aaf7241991dd4081c2b36f071104aaebb5a3885080c1f0bd7efea173c18b0fec53c029d9de534d60a7ee8e65597b817e36445dcc64eb2db8d17d1c434bafb90b2f521926392432adb8edcdcd7981f570b1dfcf10459c5fd592d2168b82424dfaafd061548a34ab5848bd8281e15eaa20e311d9106c4b4a03feda1426b8beb5999f2bcbf9ad2f0", @ANYRESDEC=r0, @ANYRES32], 0x38}}, {{&(0x7f0000000300), 0x6e, &(0x7f0000004c00)=[{&(0x7f0000000380)=""/232, 0xe8}], 0x1, &(0x7f0000001500)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xc8}}, {{&(0x7f0000001600)=@abs, 0x6e, &(0x7f0000001b00)=[{&(0x7f0000001680)=""/137, 0x89}, {&(0x7f0000001740)=""/249, 0xf9}, {&(0x7f0000001840)=""/35, 0x23}, {&(0x7f0000001880)=""/249, 0xf9}, {&(0x7f0000001980)=""/110, 0x6e}, {&(0x7f0000001a00)=""/239, 0xef}], 0x6, &(0x7f0000001b80)}}, {{&(0x7f0000001cc0)=@abs, 0x6e, &(0x7f0000001d40), 0x0, &(0x7f00000020c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}, {{&(0x7f00000021c0)=@abs, 0x6e, &(0x7f00000036c0)=[{&(0x7f0000002240)=""/4096, 0x1000}, {&(0x7f0000003240)=""/238, 0xee}, {&(0x7f0000003340)=""/62, 0x3e}, {&(0x7f0000003380)=""/212, 0xd4}, {&(0x7f0000003480)=""/68, 0x44}, {&(0x7f0000001e00)=""/245, 0xf5}, {&(0x7f0000003600)=""/108, 0x6c}, {&(0x7f0000003680)=""/50, 0x32}], 0x8}}, {{&(0x7f0000003740)=@abs, 0xffffffffffffff0d, &(0x7f0000003840)=[{&(0x7f00000037c0)=""/93, 0x5d}], 0x1, &(0x7f0000003880)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}}], 0x6, 0x2040, &(0x7f0000003a80)={0x77359400}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x48000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xe30}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)=ANY=[@ANYRES16, @ANYRES32=r2, @ANYBLOB]) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r2, 0x43, 0x5, 0x3ff, 0x8}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) syz_mount_image$vfat(&(0x7f0000004d40), &(0x7f0000004d80)='./file1\x00', 0x0, 0x9, &(0x7f00000057c0)=[{&(0x7f0000004dc0)="71d93414e771fbe44034cb10cd3b49df7797923ff142e722b53a9e87f1bad0b2b2b58813d9eead3fbe9c7a2ee8257f1c245a25a273a2066ccdd98d6630e0b40d20eab970062bc8aaadf36fbce0666548d8ee52e82ecc6f9ae51525acae0cc89db9847dcf70878302f56ce5a8de8f4f9bccefb21d46ba3b31572100ad45adb2c3700591", 0x83, 0xa1}, {&(0x7f0000004e80)="fe56c5077ba51e3435a0e033e883cf6db150ae4e6f2fc51795f969a5b6b290610d65eb473ded19c4b74863cda1ce", 0x2e, 0x4}, {&(0x7f0000004ec0)="01fc9dee1a0270cc3c8ae954b2db3bc6cb7df35777a39dcd2b5de0072d93db862a3d42a1d613dc18572b4018088d8049c09cd14aa50150f587bbfd1e1abc82fa0d1a13f5e6f4033840746c58f2446c291eeae4a58e1a196b9f04e62d0e74243207c5faf134127e6e4050", 0x6a, 0x401}, {&(0x7f0000004f40)="2a788e676128303a2270694dd14a90d2e0769d5c6094a5e8b3bd", 0x1a, 0x20}, {&(0x7f00000054c0)="ee9b2a3b1572b2e5b29568585d803203d006adb1092016554e3f16aa5a8de3006a33aa38a66eea2a13c3b5ee5b0a85f51ca9e42525e22ac7f098a6f96c60d0d4d7acae4d7c5ab55f3fc30ab5fc1fdacc97f27f2ea7d9c98c5ac6d5228803d9442320289eff7305a524062972152c2dd98457f354582e1c102ac9cc3dcff010f149b299f821967e2e4ae30c63308712e33c61f9300d96202af08aff040ea1dda5b9103b768eea735e0ed6545d3fe0dc7bfde033642ecaa88d83b6cbe649a8d9b6a81a5381dfb185a522", 0xc9, 0x6ec2}, {&(0x7f00000055c0)="ea6a503f304d006a675a137cc6c16d6f7197319afe1d0931dcb811c4997efe30dd4f455704afa748bedd922a6116608160b5bd4077ee581f17df31a40a22663b0851bb915d4a28a84a9f6854b90aa534a2c4f0c90804c82a84493a22bf06aed920cced074f6de95761fd10f1c2f6364b56069638e7db51170097297a82cb1c6b2ee3c0fd372e16f3e4c98f74b2ac182bdcb3a26645df43a4930f86dc398f05d07d8ec3a17114b946b9d0685e31a558a09906e1df81305abdfad199d4b1b0cfc8f6785b86aaf0014099d06745ccc03166e25e456e9a1f501799070b825b6ca09c83f3d6ba9cfcf018148844aa1ccb62ae845f", 0xf2, 0x10000}, {&(0x7f0000004f80)="4982e5a43dd5918dc16beebf0b4b2f805b3417aa70fa17fe2cc55a8b430b3d6df0941eecad887925b2e3beb9db7c82b961b92039fb4ff80bc85211cabb3da4d19663a28acdd953f9296a95d83dc5a5fa4b10a9274c6917c5e0c4640f22997eb2e6c3f95b037703e01af4d33de254fdd7a184e837e9fc90353ad999febb37d89a6c52569c1ffe130dab5cf20ac04dc1611816ad0731dde0c973939f86737316cd5f7a5f5e214bf309f1a65c", 0xab, 0xffff}, {&(0x7f00000056c0)="ac3e68b9d664270214503ec5850815ca7e83c3ced278272ac71ecaa671815ffd4c23acd79b4ab4a6fe60739cff384beed940abea9f357042d81a734b2ea3840aa0108998fac1c56f06454262c8020f1fbbdda16f25edc3c28159e554f4fb1cddc5d354c0d8a57852ef925d13bcbd2d48b7071a42efb7c55e99e4e9e32600cf947b97fbd83488381cf9bb58fdb642ed8567c6f7858f7f1df81463165b7ab0b623697f5ff81b6c8289901a830ce6999f9c11b7ba57f52dc5cf767cadfa79a73069cd9ba99edf37fd", 0xc7, 0x2000}, {&(0x7f00000050c0)="42e839ea80e1bd99ca02fc82b2d8fcd4bb54859ab512219f7f656b3a7ce90f83997226bdbb48d113db6b866a1f9400e63bbc12f56e860ee7", 0x38, 0x8}], 0x84000, &(0x7f00000058c0)={[{@shortname_mixed}, {@utf8no}, {@rodir}, {@nonumtail}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ethtool\x00'}}, {@audit}, {@seclabel}, {@dont_appraise}, {@obj_user}, {@euid_eq={'euid', 0x3d, r6}}, {@smackfshat={'smackfshat', 0x3d, 'syz_tun\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, '\x00'}}]}) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000480)={0x0, 0x40, [0x6, 0x5, 0x2000000003712, 0x1, 0xfffffffffffffffb, 0x5]}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="01f5ffffff000100ffff15230000"], 0x14}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000005080)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000005040)={&(0x7f0000003ac0)=@xdp={0x2c, 0xe, r7, 0x1}, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003b40)="de298e6ed7a34406aeea16f9cf0888b464daabe894aa56788102f5f8ebd06531bfad87d87cf8bb14f1071fa31274f591ab1e5a4b963ef3ff6952eb75fe437f35f381e3f56dca6636178c25dad1da31de4c17c66f5fa6930b347386e077314db9d55ccd2acc0efdfc24024e9a16d593679d471e9fcb02fcbca911f693", 0x7c}, {&(0x7f0000003bc0)="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", 0x1000}, {&(0x7f0000004bc0)="465eb014e95713290ea604c16dd69629b7790537eb43ca36846f1c8711b6cc438586ed7af41efa4369311ae4", 0x2c}, {&(0x7f0000004c00)}, {&(0x7f0000004c40)="36890457ab140d699a4fbe232daa84235ddc3528d40cef870f6f74e4258124ce97fe472590109d3ac6cc5eddbcf3e1be3eb8fecd09031bffd1bb85207a516d226a4e1ae2ec7289d87b77", 0x4a}], 0x5, &(0x7f0000005100)=ANY=[@ANYBLOB="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"], 0x2f8}, 0x0, 0x20004000}, 0x10000) r8 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) fchdir(0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0x12}, 0x10150, 0x1, 0x0, 0x4, 0x2}, 0x0, 0x2, 0xffffffffffffffff, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r8, 0x40086607, &(0x7f00000004c0)) 15:23:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) 15:23:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:43 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r1, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x19) fcntl$addseals(r1, 0x409, 0xe) fallocate(r1, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat2(r0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000540)={0x1, 0xb3, 0x2}, 0x18) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='cgroup.freeze\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') recvmsg(r3, &(0x7f0000000c40)={&(0x7f00000005c0)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000640)=""/147, 0x93}, {&(0x7f0000000700)=""/181, 0xb5}, {&(0x7f00000007c0)=""/243, 0xf3}, {&(0x7f0000000180)=""/45, 0x2d}, {&(0x7f00000008c0)=""/142, 0x8e}, {&(0x7f0000000980)=""/240, 0xf0}, {&(0x7f0000000a80)=""/57, 0x39}], 0x7, &(0x7f0000000b40)=""/207, 0xcf}, 0x4000a043) 15:23:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000400), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) sendto(0xffffffffffffffff, &(0x7f0000000540)="1247d4a802e59bf93118504255d21fd212df1bb75c39c931995dcd20f1bfeb27b6ee7d9ee392719747f4cf634eb44b0803ce1a19105084cd280a0e15a6230c972f96b8e59f669d80f60236ca3d413f9fc8a1633931d13152e9e00dfe71b55e615e25884448c4da87b5ffa432f3f2eadc877b21b12f6056020a9da28241c33640cc4b2fe2052c90a5498e9c51a1f3ac1712b971c94fdcb9620f6a4f818bc48f7f99f8d276320dfc2ed1cdb1dd", 0xac, 0x20008000, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000600)={0x0, 0xffffffffffffffff, 0xda, 0x25, 0x8, 0x2}) chroot(&(0x7f0000000300)='./file1\x00') 15:23:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, 0x0, 0x0) 15:23:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x201000000000000) 15:23:43 executing program 6: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x1, 0xff, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000080)=@un=@abs, &(0x7f0000000140)=0x80) write(r1, &(0x7f0000000540)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80c1f13bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) fcntl$lock(r1, 0x23, &(0x7f0000000400)={0x2, 0x1, 0x0, 0xf916, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:23:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a", 0x17) 15:23:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x406, r1) ioctl$RNDADDENTROPY(r5, 0x40085203, &(0x7f0000000540)=ANY=[@ANYBLOB="ff0000008b000000732fdc0a9981d5530feb0e702c68694a2f65281521f22f521f53dddeb979368df645b9154755fabc5411da7e55397b3e6d7619d611649f84e3681ae288d80cd38a01099f2685d3525b062ba6a6012806265e1d313b860507ba169576026d58b853ef4839baa0a2fe6c5529fc3b1787d24bf3919727f55bc6bf92aa3c4be5afcd229574b85ca6a7f2bf727d"]) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:23:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x500000000000000) 15:23:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, 0x0, 0x0) 15:23:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x0, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3017.743907] attempt to access beyond end of device [ 3017.743907] loop3: rw=2049, want=21, limit=15 15:23:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) 15:23:43 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:43 executing program 7: syz_mount_image$vfat(&(0x7f0000000440), &(0x7f00000000c0)='./file2\x00', 0x0, 0x0, &(0x7f0000000180), 0x19b9010, &(0x7f0000000280)=ANY=[]) r0 = memfd_create(&(0x7f0000000280)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440), 0x0, 0x8000, 0x4, 0x3) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x27c28, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000340), 0x3}, 0xa980, 0x4, 0x23f, 0x8498d7979708911d, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x94) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x4) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) r4 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f0000000400)) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:23:43 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000400)='./file2\x00', 0x55b240, 0x1a8) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:23:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, 0x0, 0x0) 15:23:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:23:43 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x0, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3017.965588] attempt to access beyond end of device [ 3017.965588] loop3: rw=2049, want=21, limit=15 15:23:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:23:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:58 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:23:58 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1080a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) open_tree(0xffffffffffffff9c, &(0x7f0000000400)='./file2\x00', 0x101) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x4e21, 0x1, @local, 0x7}, 0x1c) ioctl$AUTOFS_IOC_PROTOVER(0xffffffffffffffff, 0x80049363, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:23:58 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:23:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:23:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x600000000000000) 15:23:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000400)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@v1={0x2, "b23451bd70"}, 0x6, 0x2) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:24:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x700000000000000) 15:24:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xa, 0x40010, r0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x7ff, 0x2, &(0x7f0000000240)=[{&(0x7f0000000400)="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", 0x1000, 0x7ff}, {&(0x7f0000000140)="33cd52d0cdb07f2a65217a63399f455850072c2fe9b24898be8592ab3c0023f1e26119e81224dd8720e71a347f78b5a58265abe6e34c6d59ffb3120f2555c754ee3ae420667410f5a20dee1d87d13123f39350d35aaa255b3ebaf36a760ccc5ab5bf89a7f3cc48dd3f31392f5e01bf04d94ed3254f480fe28b5a9537ab8a16db6e16fb7f4038a9f7b395f224a19311c12917c8a3a6de910d95aee0a94a346f384f8fdd012f75d22b040a84f0d7bd823b5d9cfd7c2bd45c44b32683f79eba5ec7b5adc389c89dad862770d4c0d0738e51176be76de2dc69757fd46ed5c769e4a3a36717cfd10f5e2a42b54740", 0xec, 0xff}], 0x12c40, &(0x7f0000000280)={[{@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x39, 0x30]}}}}, {@huge_always}], [{@seclabel}, {@smackfstransmute={'smackfstransmute', 0x3d, '@'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@hash}]}) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)=ANY=[], 0xfdef) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/pci_hotplug', 0x58000, 0x2) io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) socket$inet(0x2, 0x0, 0xfc) syz_io_uring_complete(r1) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000003c0)=[r4, 0xffffffffffffffff], 0x2) io_uring_enter(r3, 0x5bf1, 0xe9bd, 0x0, &(0x7f0000000080), 0x8) dup(r0) 15:24:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:24:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:24:15 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:24:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(0xffffffffffffffff, 0x0, 0x100, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) creat(&(0x7f0000000400)='./file2\x00', 0x40) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:24:15 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:15 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:16 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:16 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) r2 = openat$cgroup_type(r1, &(0x7f0000000400), 0x2, 0x0) pwritev2(r2, &(0x7f0000001840)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="7d8d0ceac514a8a0c3f0743c931a6394d7b8b562d14c7bfa419bb232ddddc6b735b55a29931fe1184eab0408dd9b3bbc1d3fa3ad13beba39158f5678f0478cb06ecc4536e8247e2455da5848bb7783484813174b8ed4e33772c6568efe8060c9fd2b5467239e245eac09e7c95bd09dcc2a92854cd34fb6ba386e2239c3fb1cbbb17b5f73d7b578eb5a05edad0e80022975b6c9eb", 0x94}, {&(0x7f0000001600)="9d03ef1bff85c09e2fc898866c720ff750f53fa13659a2d3b6c977c45e5a7f3eabbebde9a7792fa0f1e3da3e6dac5b8cdd67aaa637ea6e564b7e35ec33dc004671d7a741c86fc4f0dc4d0561b6d2d0418594201b81b2d4d289de3b1f633bcd135d7b7dc525ac03a58a512a418aa7cda9bb1c18c58d7b467b8aca", 0x7a}, {&(0x7f0000001680)="19fc60168f6387c0feac7a7296362eaa0dae76cd6976f18c716ecdf7a112f2207ecd60783d03eeaf40022f5d8c071cf70bdc2762cfedd0a3c71f02cbd4af775d4c3ed4d22f829dece3fae6700d46234a3a247d976d016a1c7987a70c6b606ef1f0a1fad3a642774065e6db6227ad518ff250ebb7f60f9e1b7b288d7e544f4f37eff40a125d77b78e2d77eb49dc8dbe5256a74f2840555015b535dfefdbbf3f56c8d2d835dd5fb4e22a2699765fe45d11e6", 0xb1}, {&(0x7f0000001740)="26a6bbec82333c4bcf808d24127f3fb41ee70de9db2c6356a465067c9658a61cb0cf2646529a902dbd4ad82551539841bb43fc346f6bd7014fc32909cb692e1ba900895fddef00ac95f7b951bddbe00d2ee7b7eb3b5a9471611839196ffb7fae23d60a3c32a82acd68985f0882826c62adceef7db8f7dfe1f64f080c89c751d4cae4e5ea735bf0801449aacd5e3cb8dacd86e4698b74b48058e0993c71f5de97c3a4bf3007468fbd28c3a9f597b51fbf33203448fa403eddc1c68a0111d1b9497eaa4b54dba0a2f9a1cb5a644eac8a00464c878f6308d9fb4a9986385b6d185fecb6c07306b0bf335cf3", 0xea}], 0x5, 0x6, 0x4, 0x1) creat(&(0x7f0000000200)='./file1\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r3, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) chroot(&(0x7f0000000300)='./file1\x00') 15:24:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a", 0x17) 15:24:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:32 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="faffffffffffffff66617400020801000470008420f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000580)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x2, 0x80000000) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x101000, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:24:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x800000000000000) 15:24:32 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_alloc(0x0, 0x3) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000080)=0x1f3, 0x4, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) mlock2(&(0x7f0000fee000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0_to_bond\x00'}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, 0xffffffffffffffff) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140)=0xc2f30000000, 0x2000000080) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000180)=""/94) shmat(r1, &(0x7f0000ff8000/0x2000)=nil, 0x4000) mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) mbind(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x1, &(0x7f00000000c0)=0x59cdf60b, 0x1, 0x2) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) madvise(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x9) 15:24:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:32 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x2540, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:24:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 1) [ 3066.823605] FAULT_INJECTION: forcing a failure. [ 3066.823605] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 3066.825097] CPU: 0 PID: 17125 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3066.825818] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3066.826656] Call Trace: [ 3066.826938] dump_stack+0x107/0x167 [ 3066.827317] should_fail.cold+0x5/0xa [ 3066.827714] __alloc_pages_nodemask+0x182/0x600 [ 3066.828189] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 3066.828796] ? find_get_entry+0x2c8/0x740 [ 3066.829230] alloc_pages_current+0x187/0x280 [ 3066.829740] __page_cache_alloc+0x2d2/0x360 [ 3066.830195] pagecache_get_page+0x2c7/0xc80 [ 3066.830638] ? perf_trace_lock+0xac/0x490 [ 3066.831058] grab_cache_page_write_begin+0x64/0xa0 [ 3066.831577] cont_write_begin+0x448/0x980 [ 3066.832009] ? fat_add_cluster+0x100/0x100 [ 3066.832454] ? nobh_write_begin+0xed0/0xed0 [ 3066.832915] ? __mark_inode_dirty+0x93b/0xd40 [ 3066.833375] ? lock_downgrade+0x6d0/0x6d0 [ 3066.833815] ? do_raw_spin_lock+0x121/0x260 [ 3066.834266] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3066.834805] fat_write_begin+0x89/0x180 [ 3066.835217] ? fat_add_cluster+0x100/0x100 [ 3066.835668] generic_perform_write+0x20a/0x4f0 [ 3066.836142] ? fat_direct_IO+0x1ef/0x380 [ 3066.836571] ? page_cache_prev_miss+0x310/0x310 [ 3066.837064] __generic_file_write_iter+0x2cd/0x5d0 [ 3066.837585] generic_file_write_iter+0xdb/0x230 [ 3066.838065] ? iov_iter_init+0x3c/0x130 [ 3066.838491] new_sync_write+0x42c/0x660 [ 3066.838901] ? new_sync_read+0x6f0/0x6f0 [ 3066.839330] ? ksys_write+0x12d/0x260 [ 3066.839736] ? lock_release+0x680/0x680 [ 3066.840154] ? selinux_file_permission+0x92/0x520 [ 3066.840662] ? __fget_files+0x296/0x4c0 [ 3066.841097] vfs_write+0x747/0xa70 [ 3066.841467] ksys_write+0x12d/0x260 [ 3066.841852] ? __ia32_sys_read+0xb0/0xb0 [ 3066.842273] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3066.842825] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3066.843363] do_syscall_64+0x33/0x40 [ 3066.843757] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3066.844291] RIP: 0033:0x7fd0ff1b0b19 [ 3066.844692] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3066.846594] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3066.847400] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3066.848136] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3066.848883] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3066.849626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3066.850361] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3066.871018] attempt to access beyond end of device [ 3066.871018] loop4: rw=2049, want=21, limit=15 15:24:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 2) 15:24:32 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) 15:24:32 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:32 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2000000000000000}, 0x11010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) pkey_alloc(0x0, 0x3) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000080)=0x1f3, 0x4, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) mlock2(&(0x7f0000fee000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0_to_bond\x00'}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x4000004, 0xffffffffffffffff) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000140)=0xc2f30000000, 0x2000000080) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000180)=""/94) shmat(r1, &(0x7f0000ff8000/0x2000)=nil, 0x4000) mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) mbind(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x1, &(0x7f00000000c0)=0x59cdf60b, 0x1, 0x2) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000100)) madvise(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x9) [ 3067.177084] FAULT_INJECTION: forcing a failure. [ 3067.177084] name failslab, interval 1, probability 0, space 0, times 0 [ 3067.179766] CPU: 0 PID: 17150 Comm: syz-executor.3 Not tainted 5.10.201 #1 15:24:33 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x50e, 0x0, &(0x7f0000000180), 0x200000, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(r1, &(0x7f0000000400)='./file3\x00', 0x40000, 0x4) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x2, 0x0, 0x40, 0x0, 0x0, 0x4307, 0x8008, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)=ANY=[@ANYBLOB="bd000000010000001800000071715f9960dc88b27d5f72d300cab789", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000400)=0x5) [ 3067.181323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3067.183295] Call Trace: [ 3067.183897] dump_stack+0x107/0x167 [ 3067.184758] should_fail.cold+0x5/0xa [ 3067.185623] ? create_object.isra.0+0x3a/0xa20 [ 3067.186661] should_failslab+0x5/0x20 [ 3067.187522] kmem_cache_alloc+0x5b/0x310 [ 3067.188448] create_object.isra.0+0x3a/0xa20 [ 3067.189452] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3067.190594] kmem_cache_alloc+0x159/0x310 [ 3067.191527] alloc_buffer_head+0x20/0x110 [ 3067.192448] alloc_page_buffers+0x14d/0x700 [ 3067.193421] create_empty_buffers+0x2c/0x640 [ 3067.194410] create_page_buffers+0x1bb/0x230 [ 3067.195397] __block_write_begin_int+0x1d1/0x19c0 [ 3067.196476] ? fat_add_cluster+0x100/0x100 [ 3067.197460] ? add_to_page_cache_locked+0x40/0x40 [ 3067.198539] ? __page_cache_alloc+0x10d/0x360 15:24:33 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000400), &(0x7f0000000540)='./file1\x00', 0x9, 0x1, &(0x7f0000000680)=[{&(0x7f0000000580)="362bdb57b273c1752e1daaef6c24f99c669df8818d386ca525a06b6d300a5865b5531b3a1e3547a4f8b4c1907721f5a3a875f6a69d434602a0fbb343b6a38d66c6dafa21a403093fb7a8aae0a4ef674207dca784945e1536c96c6c95d8d64d01f1ab8d3d232936ff013bb5e60cd7ec9ea6c116f43efa4207e6f3416ae7020501f8b4db031e5984be9ed2d8d95b5f5eb4bea096db09aedd19885979375cb0639bbc7f4bb3a010471b7ef087936a3602a4b8bbf177bd100c20673cd046a44a3618fa42", 0xc2, 0x7}], 0x20042, &(0x7f00000006c0)={[{'blkio.bfq.dequeue\x00'}, {'blkio.bfq.dequeue\x00'}, {}, {'&'}, {'-'}, {}, {'blkio.bfq.dequeue\x00'}, {'vfat\x00'}], [{@fowner_gt}, {@uid_lt}, {@appraise_type}]}) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') [ 3067.199553] ? remove_inode_buffers+0x300/0x300 [ 3067.200689] ? pagecache_get_page+0x243/0xc80 [ 3067.201720] ? perf_trace_lock+0xac/0x490 [ 3067.202648] ? wait_for_stable_page+0x92/0xe0 [ 3067.203653] cont_write_begin+0x472/0x980 [ 3067.204586] ? fat_add_cluster+0x100/0x100 [ 3067.205534] ? nobh_write_begin+0xed0/0xed0 [ 3067.206485] ? __mark_inode_dirty+0x93b/0xd40 [ 3067.207472] ? lock_downgrade+0x6d0/0x6d0 [ 3067.208392] ? do_raw_spin_lock+0x121/0x260 [ 3067.209358] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3067.210482] fat_write_begin+0x89/0x180 [ 3067.211358] ? fat_add_cluster+0x100/0x100 [ 3067.212298] generic_perform_write+0x20a/0x4f0 [ 3067.213323] ? fat_direct_IO+0x1ef/0x380 [ 3067.214217] ? page_cache_prev_miss+0x310/0x310 [ 3067.215264] __generic_file_write_iter+0x2cd/0x5d0 [ 3067.216354] generic_file_write_iter+0xdb/0x230 [ 3067.217391] ? iov_iter_init+0x3c/0x130 [ 3067.218274] new_sync_write+0x42c/0x660 [ 3067.219144] ? new_sync_read+0x6f0/0x6f0 [ 3067.220029] ? ksys_write+0x12d/0x260 [ 3067.220882] ? lock_release+0x680/0x680 [ 3067.221747] ? selinux_file_permission+0x92/0x520 [ 3067.222801] ? __fget_files+0x296/0x4c0 [ 3067.223684] vfs_write+0x747/0xa70 [ 3067.224469] ksys_write+0x12d/0x260 [ 3067.225297] ? __ia32_sys_read+0xb0/0xb0 [ 3067.226195] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3067.227335] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3067.228471] do_syscall_64+0x33/0x40 [ 3067.229298] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3067.230419] RIP: 0033:0x7fd0ff1b0b19 [ 3067.231239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3067.235243] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3067.236891] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3067.238430] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3067.239965] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3067.241522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3067.243058] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 15:24:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x0, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3067.367007] attempt to access beyond end of device [ 3067.367007] loop3: rw=2049, want=21, limit=15 [ 3067.418744] FAT-fs (loop6): Unrecognized mount option "./file2" or missing value 15:24:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) 15:24:33 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x900000000000000) 15:24:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 3) 15:24:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3067.553183] attempt to access beyond end of device [ 3067.553183] loop4: rw=2049, want=21, limit=15 [ 3067.572177] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 3067.602963] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 3067.756220] FAULT_INJECTION: forcing a failure. [ 3067.756220] name failslab, interval 1, probability 0, space 0, times 0 [ 3067.758881] CPU: 0 PID: 17195 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3067.760492] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3067.762272] Call Trace: [ 3067.762843] dump_stack+0x107/0x167 [ 3067.763633] should_fail.cold+0x5/0xa [ 3067.764455] ? create_object.isra.0+0x3a/0xa20 [ 3067.765455] should_failslab+0x5/0x20 [ 3067.766277] kmem_cache_alloc+0x5b/0x310 [ 3067.767165] create_object.isra.0+0x3a/0xa20 [ 3067.768116] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3067.769236] kmem_cache_alloc+0x159/0x310 [ 3067.770141] alloc_buffer_head+0x20/0x110 [ 3067.771035] alloc_page_buffers+0x14d/0x700 [ 3067.771977] create_empty_buffers+0x2c/0x640 [ 3067.772945] create_page_buffers+0x1bb/0x230 [ 3067.773904] __block_write_begin_int+0x1d1/0x19c0 [ 3067.774952] ? fat_add_cluster+0x100/0x100 [ 3067.775871] ? add_to_page_cache_locked+0x40/0x40 [ 3067.776929] ? __page_cache_alloc+0x10d/0x360 [ 3067.777901] ? remove_inode_buffers+0x300/0x300 [ 3067.778907] ? pagecache_get_page+0x243/0xc80 [ 3067.779880] ? perf_trace_lock+0xac/0x490 [ 3067.780789] ? wait_for_stable_page+0x92/0xe0 [ 3067.781764] cont_write_begin+0x472/0x980 [ 3067.782673] ? fat_add_cluster+0x100/0x100 [ 3067.783589] ? nobh_write_begin+0xed0/0xed0 [ 3067.784519] ? __mark_inode_dirty+0x93b/0xd40 [ 3067.785503] ? lock_downgrade+0x6d0/0x6d0 [ 3067.786400] ? do_raw_spin_lock+0x121/0x260 [ 3067.787332] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3067.788436] fat_write_begin+0x89/0x180 [ 3067.789299] ? fat_add_cluster+0x100/0x100 [ 3067.790220] generic_perform_write+0x20a/0x4f0 [ 3067.791217] ? fat_direct_IO+0x1ef/0x380 [ 3067.792095] ? page_cache_prev_miss+0x310/0x310 [ 3067.793131] __generic_file_write_iter+0x2cd/0x5d0 [ 3067.794200] generic_file_write_iter+0xdb/0x230 [ 3067.795201] ? iov_iter_init+0x3c/0x130 [ 3067.796068] new_sync_write+0x42c/0x660 [ 3067.796946] ? new_sync_read+0x6f0/0x6f0 [ 3067.797826] ? ksys_write+0x12d/0x260 [ 3067.798655] ? lock_release+0x680/0x680 [ 3067.799514] ? selinux_file_permission+0x92/0x520 [ 3067.800562] ? __fget_files+0x296/0x4c0 [ 3067.801444] vfs_write+0x747/0xa70 [ 3067.802224] ksys_write+0x12d/0x260 [ 3067.803013] ? __ia32_sys_read+0xb0/0xb0 [ 3067.803898] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3067.805047] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3067.806169] do_syscall_64+0x33/0x40 [ 3067.806979] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3067.808088] RIP: 0033:0x7fd0ff1b0b19 [ 3067.808904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3067.812880] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3067.814522] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3067.816079] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3067.817647] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3067.819176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3067.820726] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3067.841128] attempt to access beyond end of device [ 3067.841128] loop3: rw=2049, want=21, limit=15 15:24:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xa00000000000000) 15:24:49 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e6661740002080100047000c18400f8", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:24:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x0, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:24:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 4) 15:24:49 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) (fail_nth: 1) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="0837023accfd33090000", @ANYRES16=r1, @ANYBLOB="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"], 0x208}, 0x1, 0x0, 0x0, 0x4000804}, 0x8000880) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8002}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xfc, r2, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xa6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x420}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40004000}, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x6c, r2, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @handle=@pci={{0x8}, {0x11}}, @handle=@pci={{0x8}, {0x11}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x40004) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r3, 0x0, 0x0, 0x1000002) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x100000f, 0x1f012, r3, 0x0) 15:24:49 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c2e66617400020800000000008400f8010000000000", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000680)='./file0\x00') setresuid(0x0, 0x0, 0xffffffffffffffff) mount$cgroup(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000540), 0x802000, &(0x7f0000000580)=ANY=[@ANYBLOB='xattr,name=^(!\',cpuset_v2_mode,dont_hash,dont_measure,smackfsroot=\'[\',euid<', @ANYRESDEC=0x0, @ANYBLOB=',smackfsfloor=vfat\x00,fowner>', @ANYRESDEC=0x0, @ANYBLOB=',fowner>', @ANYRESDEC=0x0, @ANYBLOB=',euid<', @ANYRESDEC=0x0, @ANYBLOB='\tntext=root,\x00\x00\x00\x00\x00\x00']) [ 3083.764229] FAT-fs (loop7): invalid media value (0x00) [ 3083.765419] FAT-fs (loop7): Can't find a valid FAT filesystem [ 3083.768237] FAULT_INJECTION: forcing a failure. [ 3083.768237] name failslab, interval 1, probability 0, space 0, times 0 [ 3083.770890] CPU: 0 PID: 17221 Comm: syz-executor.2 Not tainted 5.10.201 #1 [ 3083.772240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3083.773874] Call Trace: [ 3083.774413] dump_stack+0x107/0x167 [ 3083.775132] should_fail.cold+0x5/0xa [ 3083.775885] ? kvmalloc_node+0x119/0x170 [ 3083.776684] should_failslab+0x5/0x20 [ 3083.777455] __kmalloc_node+0x76/0x420 [ 3083.778227] kvmalloc_node+0x119/0x170 [ 3083.778989] seq_read_iter+0x81c/0x12b0 [ 3083.779775] ? __lockdep_reset_lock+0x180/0x180 [ 3083.780697] seq_read+0x3dd/0x5b0 [ 3083.781388] ? seq_read_iter+0x12b0/0x12b0 [ 3083.782219] ? _cond_resched+0x12/0x80 [ 3083.782986] ? avc_policy_seqno+0x9/0x70 [ 3083.783788] ? selinux_file_permission+0x92/0x520 [ 3083.784757] ? seq_read_iter+0x12b0/0x12b0 [ 3083.785597] vfs_read+0x228/0x580 [ 3083.786286] __x64_sys_pread64+0x201/0x260 [ 3083.787126] ? ksys_pread64+0x1b0/0x1b0 [ 3083.787907] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3083.788965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3083.789972] do_syscall_64+0x33/0x40 [ 3083.790717] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3083.791709] RIP: 0033:0x7f4cfdfa3b19 [ 3083.792462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3083.796033] RSP: 002b:00007f4cfb519188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 3083.797566] RAX: ffffffffffffffda RBX: 00007f4cfe0b6f60 RCX: 00007f4cfdfa3b19 [ 3083.798949] RDX: 000000000000100b RSI: 00000000200001c0 RDI: 0000000000000004 [ 3083.800338] RBP: 00007f4cfb5191d0 R08: 0000000000000000 R09: 0000000000000000 [ 3083.801735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3083.803120] R13: 00007ffeefb65e8f R14: 00007f4cfb519300 R15: 0000000000022000 [ 3083.805689] FAT-fs (loop6): invalid media value (0x00) [ 3083.807029] FAT-fs (loop6): Can't find a valid FAT filesystem [ 3083.826305] FAULT_INJECTION: forcing a failure. [ 3083.826305] name failslab, interval 1, probability 0, space 0, times 0 [ 3083.829131] CPU: 1 PID: 17207 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3083.830722] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3083.832616] Call Trace: [ 3083.833234] dump_stack+0x107/0x167 [ 3083.834082] should_fail.cold+0x5/0xa [ 3083.834962] ? create_object.isra.0+0x3a/0xa20 [ 3083.836011] should_failslab+0x5/0x20 [ 3083.836916] kmem_cache_alloc+0x5b/0x310 [ 3083.837861] create_object.isra.0+0x3a/0xa20 [ 3083.838870] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3083.840027] kmem_cache_alloc+0x159/0x310 [ 3083.840991] alloc_buffer_head+0x20/0x110 [ 3083.841928] alloc_page_buffers+0x14d/0x700 [ 3083.842918] create_empty_buffers+0x2c/0x640 [ 3083.843925] create_page_buffers+0x1bb/0x230 [ 3083.845052] __block_write_begin_int+0x1d1/0x19c0 [ 3083.846295] ? fat_add_cluster+0x100/0x100 [ 3083.847335] ? add_to_page_cache_locked+0x40/0x40 [ 3083.848507] ? __page_cache_alloc+0x10d/0x360 [ 3083.849647] ? remove_inode_buffers+0x300/0x300 [ 3083.850771] ? pagecache_get_page+0x243/0xc80 [ 3083.851850] ? perf_trace_lock+0xac/0x490 [ 3083.852849] ? wait_for_stable_page+0x92/0xe0 [ 3083.853932] cont_write_begin+0x472/0x980 [ 3083.854937] ? fat_add_cluster+0x100/0x100 [ 3083.855953] ? nobh_write_begin+0xed0/0xed0 [ 3083.856988] ? __mark_inode_dirty+0x93b/0xd40 [ 3083.858061] ? lock_downgrade+0x6d0/0x6d0 [ 3083.859051] ? do_raw_spin_lock+0x121/0x260 [ 3083.860084] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3083.861322] fat_write_begin+0x89/0x180 [ 3083.862184] ? fat_add_cluster+0x100/0x100 [ 3083.863040] generic_perform_write+0x20a/0x4f0 [ 3083.863981] ? fat_direct_IO+0x1ef/0x380 [ 3083.864804] ? page_cache_prev_miss+0x310/0x310 [ 3083.865786] __generic_file_write_iter+0x2cd/0x5d0 [ 3083.866785] generic_file_write_iter+0xdb/0x230 [ 3083.867754] ? iov_iter_init+0x3c/0x130 [ 3083.868569] new_sync_write+0x42c/0x660 [ 3083.869385] ? new_sync_read+0x6f0/0x6f0 [ 3083.870207] ? ksys_write+0x12d/0x260 [ 3083.870982] ? lock_release+0x680/0x680 [ 3083.871786] ? selinux_file_permission+0x92/0x520 [ 3083.872765] ? __fget_files+0x296/0x4c0 [ 3083.873602] vfs_write+0x747/0xa70 [ 3083.874339] ksys_write+0x12d/0x260 [ 3083.875090] ? __ia32_sys_read+0xb0/0xb0 [ 3083.875920] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3083.877022] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3083.878076] do_syscall_64+0x33/0x40 [ 3083.878837] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3083.879887] RIP: 0033:0x7fd0ff1b0b19 [ 3083.880654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3083.884444] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3083.886004] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3083.887443] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000004 [ 3083.888878] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3083.890330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3083.891769] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3083.897166] attempt to access beyond end of device [ 3083.897166] loop3: rw=2049, want=21, limit=15 15:24:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:24:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 5) 15:24:49 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x0, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3084.063275] FAT-fs (loop7): Unrecognized mount option "./file2" or missing value [ 3084.096590] FAT-fs (loop6): Unrecognized mount option "./file2" or missing value 15:24:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380), 0x0) 15:24:50 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) (fail_nth: 2) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:24:50 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x10a400, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') [ 3084.232433] FAULT_INJECTION: forcing a failure. [ 3084.232433] name failslab, interval 1, probability 0, space 0, times 0 [ 3084.235752] CPU: 1 PID: 17256 Comm: syz-executor.2 Not tainted 5.10.201 #1 [ 3084.237180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3084.238865] Call Trace: [ 3084.239409] dump_stack+0x107/0x167 [ 3084.240157] should_fail.cold+0x5/0xa [ 3084.240952] ? create_object.isra.0+0x3a/0xa20 [ 3084.241884] ? create_object.isra.0+0x3a/0xa20 [ 3084.242820] should_failslab+0x5/0x20 [ 3084.243603] kmem_cache_alloc+0x5b/0x310 [ 3084.244063] FAULT_INJECTION: forcing a failure. [ 3084.244063] name failslab, interval 1, probability 0, space 0, times 0 [ 3084.244439] create_object.isra.0+0x3a/0xa20 [ 3084.244461] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3084.244487] __kmalloc_node+0x1ae/0x420 [ 3084.244515] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3084.250090] kvmalloc_node+0x119/0x170 [ 3084.250890] seq_read_iter+0x81c/0x12b0 [ 3084.251721] seq_read+0x3dd/0x5b0 [ 3084.252426] ? seq_read_iter+0x12b0/0x12b0 [ 3084.253291] ? _cond_resched+0x5d/0x80 [ 3084.254088] ? avc_policy_seqno+0x9/0x70 [ 3084.254920] ? selinux_file_permission+0x92/0x520 [ 3084.255917] ? seq_read_iter+0x12b0/0x12b0 [ 3084.256776] vfs_read+0x228/0x580 [ 3084.257515] __x64_sys_pread64+0x201/0x260 [ 3084.258374] ? ksys_pread64+0x1b0/0x1b0 [ 3084.259186] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3084.260242] do_syscall_64+0x33/0x40 [ 3084.261011] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3084.262053] RIP: 0033:0x7f4cfdfa3b19 [ 3084.262813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3084.266548] RSP: 002b:00007f4cfb519188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 3084.268100] RAX: ffffffffffffffda RBX: 00007f4cfe0b6f60 RCX: 00007f4cfdfa3b19 [ 3084.269555] RDX: 000000000000100b RSI: 00000000200001c0 RDI: 0000000000000004 [ 3084.271002] RBP: 00007f4cfb5191d0 R08: 0000000000000000 R09: 0000000000000000 [ 3084.272445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3084.273907] R13: 00007ffeefb65e8f R14: 00007f4cfb519300 R15: 0000000000022000 [ 3084.275383] CPU: 0 PID: 17262 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3084.276393] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3084.277596] Call Trace: [ 3084.277984] dump_stack+0x107/0x167 15:24:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xb00000000000000) [ 3084.278595] should_fail.cold+0x5/0xa [ 3084.279178] ? __iomap_dio_rw+0x1ee/0x1110 [ 3084.279803] should_failslab+0x5/0x20 [ 3084.280358] kmem_cache_alloc_trace+0x55/0x320 [ 3084.281042] __iomap_dio_rw+0x1ee/0x1110 [ 3084.281636] ? jbd2_journal_stop+0x188/0xdc0 [ 3084.282270] ? iomap_dio_bio_actor+0xef0/0xef0 [ 3084.282925] ? ext4_orphan_add+0x253/0x9e0 [ 3084.283540] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 3084.284245] ? ext4_empty_dir+0xae0/0xae0 [ 3084.284842] ? jbd2__journal_start+0xf3/0x7e0 [ 3084.285500] iomap_dio_rw+0x31/0x90 [ 3084.286028] ext4_file_write_iter+0xb26/0x18d0 [ 3084.286704] ? ext4_file_read_iter+0x4c0/0x4c0 [ 3084.287357] ? __lockdep_reset_lock+0x180/0x180 [ 3084.288022] ? __lockdep_reset_lock+0x180/0x180 [ 3084.288689] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3084.289455] new_sync_write+0x42c/0x660 [ 3084.290028] ? new_sync_read+0x6f0/0x6f0 [ 3084.290612] ? ksys_write+0x12d/0x260 [ 3084.291162] ? lock_release+0x680/0x680 [ 3084.291732] ? selinux_file_permission+0x92/0x520 [ 3084.292429] ? __fget_files+0x296/0x4c0 [ 3084.293026] vfs_write+0x747/0xa70 [ 3084.293551] ksys_write+0x12d/0x260 [ 3084.294070] ? __ia32_sys_read+0xb0/0xb0 [ 3084.294655] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3084.295396] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3084.296131] do_syscall_64+0x33/0x40 [ 3084.296663] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3084.297403] RIP: 0033:0x7fd0ff1b0b19 [ 3084.297930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3084.300521] RSP: 002b:00007fd0fc705188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3084.301603] RAX: ffffffffffffffda RBX: 00007fd0ff2c4020 RCX: 00007fd0ff1b0b19 [ 3084.302612] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000005 [ 3084.303619] RBP: 00007fd0fc7051d0 R08: 0000000000000000 R09: 0000000000000000 [ 3084.304625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3084.305646] R13: 00007ffe26656eef R14: 00007fd0fc705300 R15: 0000000000022000 15:24:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000700)={&(0x7f0000000540)=ANY=[@ANYBLOB="8c010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x18c}, 0x1, 0x0, 0x0, 0x41}, 0x0) chroot(&(0x7f0000000300)='./file1\x00') 15:25:05 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xc00000000000000) 15:25:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 1) 15:25:05 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 6) 15:25:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xa00000000000000) 15:25:05 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) (fail_nth: 3) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:05 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000640)='./file0\x00', 0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17, 0xfffffffffffffffc}, {0x0, 0x0, 0x8}], 0x20, &(0x7f0000000180)=ANY=[@ANYRESHEX]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file2\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) lsetxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x59, 0x2, 0x0, "e41c795921b6d0a9fe0e1afa521471c6", "7ceb978aa0cfd4e0b9f8de064daccc55c48e45990bb4464bf17c9131786514a378b4d9f2eb6a98573e91c6f2b0350356a762f1bbf58f315ab05a0d9480d680c2e81a3aae"}, 0x59, 0x3) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0, {0xec4}}, './file1\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:25:05 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) open(&(0x7f0000000400)='./file1\x00', 0x30100, 0x72) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') [ 3099.927352] FAULT_INJECTION: forcing a failure. [ 3099.927352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3099.930180] CPU: 1 PID: 17307 Comm: syz-executor.2 Not tainted 5.10.201 #1 [ 3099.931740] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3099.933631] Call Trace: [ 3099.934226] dump_stack+0x107/0x167 [ 3099.935060] should_fail.cold+0x5/0xa [ 3099.935923] _copy_to_iter+0x264/0x12d0 [ 3099.936833] ? _down_write_nest_lock+0x160/0x160 [ 3099.937939] ? memcpy+0x39/0x60 [ 3099.938692] ? _copy_from_iter_nocache+0xd60/0xd60 [ 3099.939823] ? __virt_addr_valid+0x128/0x350 [ 3099.940824] ? __check_object_size+0x319/0x440 [ 3099.941886] seq_read_iter+0xdcb/0x12b0 [ 3099.942807] seq_read+0x3dd/0x5b0 [ 3099.943768] ? seq_read_iter+0x12b0/0x12b0 [ 3099.944753] ? _cond_resched+0x12/0x80 [ 3099.945550] ? avc_policy_seqno+0x9/0x70 [ 3099.946186] ? selinux_file_permission+0x92/0x520 [ 3099.946999] ? seq_read_iter+0x12b0/0x12b0 [ 3099.947664] vfs_read+0x228/0x580 [ 3099.948207] __x64_sys_pread64+0x201/0x260 [ 3099.948890] ? ksys_pread64+0x1b0/0x1b0 [ 3099.949573] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3099.950405] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3099.951182] do_syscall_64+0x33/0x40 [ 3099.951795] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3099.952705] RIP: 0033:0x7f4cfdfa3b19 [ 3099.953438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3099.956583] RSP: 002b:00007f4cfb519188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 3099.957864] RAX: ffffffffffffffda RBX: 00007f4cfe0b6f60 RCX: 00007f4cfdfa3b19 [ 3099.958773] RDX: 000000000000100b RSI: 00000000200001c0 RDI: 0000000000000004 [ 3099.959655] RBP: 00007f4cfb5191d0 R08: 0000000000000000 R09: 0000000000000000 [ 3099.960550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3099.961437] R13: 00007ffeefb65e8f R14: 00007f4cfb519300 R15: 0000000000022000 [ 3099.965871] FAULT_INJECTION: forcing a failure. [ 3099.965871] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 3099.967334] CPU: 1 PID: 17312 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3099.968165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3099.969180] Call Trace: [ 3099.969515] dump_stack+0x107/0x167 [ 3099.969965] should_fail.cold+0x5/0xa [ 3099.970444] __alloc_pages_nodemask+0x182/0x600 [ 3099.971017] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 3099.971749] ? find_get_entry+0x2c8/0x740 [ 3099.972233] alloc_pages_current+0x187/0x280 [ 3099.972748] __page_cache_alloc+0x2d2/0x360 [ 3099.973444] pagecache_get_page+0x2c7/0xc80 [ 3099.973954] ? perf_trace_lock+0xac/0x490 [ 3099.974452] grab_cache_page_write_begin+0x64/0xa0 [ 3099.975032] cont_write_begin+0x448/0x980 [ 3099.975527] ? fat_add_cluster+0x100/0x100 [ 3099.976014] ? nobh_write_begin+0xed0/0xed0 [ 3099.976559] ? __mark_inode_dirty+0x93b/0xd40 [ 3099.977118] ? lock_downgrade+0x6d0/0x6d0 [ 3099.977632] ? do_raw_spin_lock+0x121/0x260 [ 3099.978158] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3099.978783] fat_write_begin+0x89/0x180 [ 3099.979271] ? fat_add_cluster+0x100/0x100 [ 3099.979812] generic_perform_write+0x20a/0x4f0 [ 3099.980387] ? fat_direct_IO+0x1ef/0x380 [ 3099.980888] ? page_cache_prev_miss+0x310/0x310 [ 3099.981482] __generic_file_write_iter+0x2cd/0x5d0 [ 3099.982070] generic_file_write_iter+0xdb/0x230 [ 3099.982604] ? iov_iter_init+0x3c/0x130 [ 3099.983066] new_sync_write+0x42c/0x660 [ 3099.983537] ? new_sync_read+0x6f0/0x6f0 [ 3099.984030] ? ksys_write+0x12d/0x260 [ 3099.984483] ? lock_release+0x680/0x680 [ 3099.984942] ? selinux_file_permission+0x92/0x520 [ 3099.985524] ? __fget_files+0x296/0x4c0 [ 3099.985989] vfs_write+0x747/0xa70 [ 3099.986405] ksys_write+0x12d/0x260 [ 3099.986824] ? __ia32_sys_read+0xb0/0xb0 [ 3099.987293] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3099.987918] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3099.988524] do_syscall_64+0x33/0x40 [ 3099.988950] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3099.989562] RIP: 0033:0x7f7ec0254b19 [ 3099.989991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3099.992085] RSP: 002b:00007f7ebd7a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3099.992958] RAX: ffffffffffffffda RBX: 00007f7ec0368020 RCX: 00007f7ec0254b19 [ 3099.993780] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000004 [ 3099.994593] RBP: 00007f7ebd7a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3099.995411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3099.996224] R13: 00007ffe3db9302f R14: 00007f7ebd7a9300 R15: 0000000000022000 [ 3100.009206] FAULT_INJECTION: forcing a failure. [ 3100.009206] name failslab, interval 1, probability 0, space 0, times 0 [ 3100.011896] CPU: 0 PID: 17314 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3100.013438] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3100.015126] Call Trace: [ 3100.015653] dump_stack+0x107/0x167 [ 3100.016414] should_fail.cold+0x5/0xa [ 3100.017200] ? create_object.isra.0+0x3a/0xa20 [ 3100.018146] should_failslab+0x5/0x20 [ 3100.018911] kmem_cache_alloc+0x5b/0x310 [ 3100.019773] create_object.isra.0+0x3a/0xa20 [ 3100.020667] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3100.021737] kmem_cache_alloc+0x159/0x310 [ 3100.022597] alloc_buffer_head+0x20/0x110 [ 3100.023435] alloc_page_buffers+0x14d/0x700 [ 3100.024333] create_empty_buffers+0x2c/0x640 [ 3100.025264] create_page_buffers+0x1bb/0x230 [ 3100.026187] __block_write_begin_int+0x1d1/0x19c0 [ 3100.027190] ? fat_add_cluster+0x100/0x100 [ 3100.028051] ? add_to_page_cache_locked+0x40/0x40 [ 3100.029043] ? __page_cache_alloc+0x10d/0x360 [ 3100.029972] ? remove_inode_buffers+0x300/0x300 [ 3100.030930] ? pagecache_get_page+0x243/0xc80 [ 3100.031852] ? perf_trace_lock+0xac/0x490 [ 3100.032705] ? wait_for_stable_page+0x92/0xe0 [ 3100.033651] cont_write_begin+0x472/0x980 [ 3100.034517] ? fat_add_cluster+0x100/0x100 [ 3100.035385] ? nobh_write_begin+0xed0/0xed0 [ 3100.036280] ? __mark_inode_dirty+0x93b/0xd40 [ 3100.037210] ? lock_downgrade+0x6d0/0x6d0 [ 3100.038064] ? do_raw_spin_lock+0x121/0x260 [ 3100.038947] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3100.039982] fat_write_begin+0x89/0x180 [ 3100.040786] ? fat_add_cluster+0x100/0x100 [ 3100.041662] generic_perform_write+0x20a/0x4f0 [ 3100.042600] ? fat_direct_IO+0x1ef/0x380 [ 3100.043426] ? page_cache_prev_miss+0x310/0x310 [ 3100.044389] __generic_file_write_iter+0x2cd/0x5d0 [ 3100.045427] generic_file_write_iter+0xdb/0x230 [ 3100.046372] ? iov_iter_init+0x3c/0x130 [ 3100.047197] new_sync_write+0x42c/0x660 [ 3100.048010] ? new_sync_read+0x6f0/0x6f0 [ 3100.048841] ? ksys_write+0x12d/0x260 [ 3100.049636] ? lock_release+0x680/0x680 [ 3100.050445] ? selinux_file_permission+0x92/0x520 [ 3100.051430] ? __fget_files+0x296/0x4c0 [ 3100.052253] vfs_write+0x747/0xa70 [ 3100.052985] ksys_write+0x12d/0x260 [ 3100.053739] ? __ia32_sys_read+0xb0/0xb0 [ 3100.054572] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3100.055636] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3100.056689] do_syscall_64+0x33/0x40 [ 3100.057465] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3100.058517] RIP: 0033:0x7fd0ff1b0b19 [ 3100.059286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3100.063037] RSP: 002b:00007fd0fc705188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3100.064598] RAX: ffffffffffffffda RBX: 00007fd0ff2c4020 RCX: 00007fd0ff1b0b19 [ 3100.066064] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000006 [ 3100.067511] RBP: 00007fd0fc7051d0 R08: 0000000000000000 R09: 0000000000000000 [ 3100.068966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3100.070421] R13: 00007ffe26656eef R14: 00007fd0fc705300 R15: 0000000000022000 15:25:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 2) [ 3100.137828] attempt to access beyond end of device [ 3100.137828] loop3: rw=2049, want=21, limit=15 15:25:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000540)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/asound/seq/clients\x00', 0x0, 0x0) chroot(&(0x7f0000000300)='./file1\x00') 15:25:06 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) (fail_nth: 4) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 7) [ 3100.266010] FAULT_INJECTION: forcing a failure. [ 3100.266010] name failslab, interval 1, probability 0, space 0, times 0 [ 3100.267534] CPU: 1 PID: 17330 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3100.268297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3100.269223] Call Trace: [ 3100.269531] dump_stack+0x107/0x167 [ 3100.269933] should_fail.cold+0x5/0xa [ 3100.270345] ? create_object.isra.0+0x3a/0xa20 [ 3100.270846] should_failslab+0x5/0x20 [ 3100.271268] kmem_cache_alloc+0x5b/0x310 [ 3100.271719] create_object.isra.0+0x3a/0xa20 [ 3100.272193] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3100.272757] kmem_cache_alloc+0x159/0x310 [ 3100.273214] jbd2__journal_start+0x190/0x7e0 [ 3100.273702] __ext4_journal_start_sb+0x214/0x390 [ 3100.274218] ext4_dirty_inode+0xbc/0x130 [ 3100.274666] ? ext4_setattr+0x2160/0x2160 [ 3100.275113] __mark_inode_dirty+0x492/0xd40 [ 3100.275584] ? security_inode_need_killpriv+0x79/0xa0 [ 3100.276137] generic_update_time+0x21c/0x370 [ 3100.276620] file_update_time+0x43a/0x520 [ 3100.277059] ? evict_inodes+0x420/0x420 [ 3100.277505] ? down_write_killable+0x180/0x180 [ 3100.278143] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3100.278726] file_modified+0x7d/0xa0 [ 3100.279126] ext4_file_write_iter+0x906/0x18d0 [ 3100.279776] ? ext4_file_read_iter+0x4c0/0x4c0 [ 3100.280264] ? __lockdep_reset_lock+0x180/0x180 [ 3100.280765] ? __lockdep_reset_lock+0x180/0x180 [ 3100.281271] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3100.281849] new_sync_write+0x42c/0x660 [ 3100.282280] ? new_sync_read+0x6f0/0x6f0 [ 3100.282716] ? ksys_write+0x12d/0x260 [ 3100.283124] ? lock_release+0x680/0x680 [ 3100.283555] ? selinux_file_permission+0x92/0x520 [ 3100.284176] ? __fget_files+0x296/0x4c0 [ 3100.284787] vfs_write+0x747/0xa70 [ 3100.285226] ksys_write+0x12d/0x260 [ 3100.285633] ? __ia32_sys_read+0xb0/0xb0 [ 3100.286066] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3100.286751] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3100.287303] do_syscall_64+0x33/0x40 [ 3100.287725] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3100.288267] RIP: 0033:0x7f7ec0254b19 [ 3100.288755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3100.290732] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3100.291566] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3100.292324] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3100.293246] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3100.294071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3100.294879] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 15:25:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000040), &(0x7f00000000c0)=0x8) finit_module(0xffffffffffffffff, &(0x7f0000000400)='&\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:25:06 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3100.415095] FAULT_INJECTION: forcing a failure. [ 3100.415095] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3100.416416] CPU: 1 PID: 17338 Comm: syz-executor.2 Not tainted 5.10.201 #1 [ 3100.417173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3100.418059] Call Trace: [ 3100.418343] dump_stack+0x107/0x167 [ 3100.418736] should_fail.cold+0x5/0xa [ 3100.419151] _copy_to_user+0x2e/0x180 [ 3100.419573] simple_read_from_buffer+0xcc/0x160 [ 3100.420085] proc_fail_nth_read+0x198/0x230 [ 3100.420555] ? proc_sessionid_read+0x230/0x230 [ 3100.421042] ? security_file_permission+0x24e/0x570 [ 3100.421588] ? perf_trace_initcall_start+0x101/0x380 [ 3100.422140] ? proc_sessionid_read+0x230/0x230 [ 3100.422650] vfs_read+0x228/0x580 [ 3100.423028] ksys_read+0x12d/0x260 [ 3100.423411] ? vfs_write+0xa70/0xa70 [ 3100.423818] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3100.424395] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3100.424960] do_syscall_64+0x33/0x40 [ 3100.425389] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3100.425956] RIP: 0033:0x7f4cfdf5669c [ 3100.426373] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3100.428409] RSP: 002b:00007f4cfb519170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3100.429246] RAX: ffffffffffffffda RBX: 0000000000000c15 RCX: 00007f4cfdf5669c [ 3100.430034] RDX: 000000000000000f RSI: 00007f4cfb5191e0 RDI: 0000000000000005 [ 3100.430832] RBP: 00007f4cfb5191d0 R08: 0000000000000000 R09: 0000000000000000 [ 3100.431609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3100.432379] R13: 00007ffeefb65e8f R14: 00007f4cfb519300 R15: 0000000000022000 15:25:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 3) [ 3100.562781] FAULT_INJECTION: forcing a failure. [ 3100.562781] name failslab, interval 1, probability 0, space 0, times 0 [ 3100.564121] CPU: 1 PID: 17348 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3100.564882] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3100.565803] Call Trace: [ 3100.566091] dump_stack+0x107/0x167 [ 3100.566485] should_fail.cold+0x5/0xa [ 3100.566894] ? create_object.isra.0+0x3a/0xa20 [ 3100.567381] should_failslab+0x5/0x20 [ 3100.567792] kmem_cache_alloc+0x5b/0x310 [ 3100.568238] create_object.isra.0+0x3a/0xa20 [ 3100.568708] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3100.569268] kmem_cache_alloc+0x159/0x310 [ 3100.569716] alloc_buffer_head+0x20/0x110 [ 3100.570165] alloc_page_buffers+0x14d/0x700 [ 3100.570631] create_empty_buffers+0x2c/0x640 [ 3100.571111] create_page_buffers+0x1bb/0x230 [ 3100.571586] __block_write_begin_int+0x1d1/0x19c0 [ 3100.572114] ? fat_add_cluster+0x100/0x100 [ 3100.572567] ? add_to_page_cache_locked+0x40/0x40 [ 3100.573103] ? __page_cache_alloc+0x10d/0x360 [ 3100.573581] ? remove_inode_buffers+0x300/0x300 [ 3100.574078] ? pagecache_get_page+0x243/0xc80 [ 3100.574560] ? perf_trace_lock+0xac/0x490 [ 3100.575005] ? wait_for_stable_page+0x92/0xe0 [ 3100.575495] cont_write_begin+0x472/0x980 [ 3100.575944] ? fat_add_cluster+0x100/0x100 [ 3100.576403] ? nobh_write_begin+0xed0/0xed0 [ 3100.576866] ? __mark_inode_dirty+0x93b/0xd40 [ 3100.577359] ? lock_downgrade+0x6d0/0x6d0 [ 3100.577802] ? do_raw_spin_lock+0x121/0x260 [ 3100.578261] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3100.578800] fat_write_begin+0x89/0x180 [ 3100.579227] ? fat_add_cluster+0x100/0x100 [ 3100.579682] generic_perform_write+0x20a/0x4f0 [ 3100.580168] ? fat_direct_IO+0x1ef/0x380 [ 3100.580490] FAULT_INJECTION: forcing a failure. [ 3100.580490] name failslab, interval 1, probability 0, space 0, times 0 [ 3100.580612] ? page_cache_prev_miss+0x310/0x310 [ 3100.583360] __generic_file_write_iter+0x2cd/0x5d0 [ 3100.583887] generic_file_write_iter+0xdb/0x230 [ 3100.584380] ? iov_iter_init+0x3c/0x130 [ 3100.584812] new_sync_write+0x42c/0x660 [ 3100.585244] ? new_sync_read+0x6f0/0x6f0 [ 3100.585683] ? ksys_write+0x12d/0x260 [ 3100.586093] ? lock_release+0x680/0x680 [ 3100.586513] ? selinux_file_permission+0x92/0x520 [ 3100.587034] ? __fget_files+0x296/0x4c0 [ 3100.587472] vfs_write+0x747/0xa70 [ 3100.587861] ksys_write+0x12d/0x260 [ 3100.588244] ? __ia32_sys_read+0xb0/0xb0 [ 3100.588690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3100.589254] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3100.589806] do_syscall_64+0x33/0x40 [ 3100.590210] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3100.590759] RIP: 0033:0x7fd0ff1b0b19 [ 3100.591166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3100.593137] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3100.593952] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3100.594723] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3100.595484] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3100.596239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3100.596999] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3100.597803] CPU: 0 PID: 17353 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3100.598947] attempt to access beyond end of device [ 3100.598947] loop3: rw=2049, want=21, limit=15 [ 3100.599220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3100.601866] Call Trace: [ 3100.602406] dump_stack+0x107/0x167 [ 3100.603147] should_fail.cold+0x5/0xa [ 3100.603921] ? create_object.isra.0+0x3a/0xa20 [ 3100.604841] should_failslab+0x5/0x20 [ 3100.605619] kmem_cache_alloc+0x5b/0x310 [ 3100.606448] create_object.isra.0+0x3a/0xa20 [ 3100.607334] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3100.608360] kmem_cache_alloc+0x159/0x310 [ 3100.609226] alloc_buffer_head+0x20/0x110 [ 3100.610060] alloc_page_buffers+0x14d/0x700 [ 3100.610935] create_empty_buffers+0x2c/0x640 [ 3100.611835] create_page_buffers+0x1bb/0x230 [ 3100.612729] __block_write_begin_int+0x1d1/0x19c0 [ 3100.613711] ? fat_add_cluster+0x100/0x100 [ 3100.614569] ? add_to_page_cache_locked+0x40/0x40 [ 3100.615538] ? __page_cache_alloc+0x10d/0x360 [ 3100.616446] ? remove_inode_buffers+0x300/0x300 [ 3100.617391] ? pagecache_get_page+0x243/0xc80 [ 3100.618294] ? perf_trace_lock+0xac/0x490 [ 3100.619128] ? wait_for_stable_page+0x92/0xe0 [ 3100.620034] cont_write_begin+0x472/0x980 [ 3100.620895] ? fat_add_cluster+0x100/0x100 [ 3100.621784] ? nobh_write_begin+0xed0/0xed0 [ 3100.622651] ? __mark_inode_dirty+0x93b/0xd40 [ 3100.623558] ? lock_downgrade+0x6d0/0x6d0 [ 3100.624392] ? do_raw_spin_lock+0x121/0x260 [ 3100.625269] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3100.626294] fat_write_begin+0x89/0x180 [ 3100.627093] ? fat_add_cluster+0x100/0x100 [ 3100.627950] generic_perform_write+0x20a/0x4f0 [ 3100.628879] ? fat_direct_IO+0x1ef/0x380 [ 3100.629703] ? page_cache_prev_miss+0x310/0x310 [ 3100.630663] __generic_file_write_iter+0x2cd/0x5d0 [ 3100.631662] generic_file_write_iter+0xdb/0x230 [ 3100.632606] ? iov_iter_init+0x3c/0x130 [ 3100.633438] new_sync_write+0x42c/0x660 [ 3100.634260] ? new_sync_read+0x6f0/0x6f0 [ 3100.635083] ? ksys_write+0x12d/0x260 [ 3100.635870] ? lock_release+0x680/0x680 [ 3100.636673] ? selinux_file_permission+0x92/0x520 [ 3100.637666] ? __fget_files+0x296/0x4c0 [ 3100.638489] vfs_write+0x747/0xa70 [ 3100.639215] ksys_write+0x12d/0x260 [ 3100.639961] ? __ia32_sys_read+0xb0/0xb0 [ 3100.640796] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3100.641879] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3100.642929] do_syscall_64+0x33/0x40 [ 3100.643696] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3100.644748] RIP: 0033:0x7f7ec0254b19 [ 3100.645528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3100.649259] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3100.650799] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3100.652240] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3100.653693] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3100.655137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3100.656576] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 [ 3100.660922] attempt to access beyond end of device [ 3100.660922] loop4: rw=2049, want=21, limit=15 15:25:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 4) 15:25:21 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:21 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) r3 = creat(&(0x7f0000000400)='./file0\x00', 0x40) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x7, 0x20, 0x4, 0x7, 0x0, 0x7, 0x204d0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x400, 0x1}, 0x1280, 0x4, 0x81, 0x8, 0x7fff, 0x2d4, 0xfffe, 0x0, 0x1000, 0x0, 0x50000000}, 0x0, 0xc, r3, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:25:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:21 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="0171c200000000000000000086dd6096033f00303a00fc020000000000000000000000000000ff1200000000000000000000000000010200907800000000600009e60000000000000000000000000000ffffac1e0001fe8000000000000000000000000000bb"], 0x0) syz_emit_ethernet(0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="00000802c2ff3d63f2ccde0000000000000000"], &(0x7f0000000180)={0x1, 0x4, [0x108, 0xb7e, 0xd85, 0xf2f]}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() setpgid(0x0, r1) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8, 0x7f, 0x1, 0x7a, 0x0, 0x4, 0x1, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0xc300, 0x4, 0x1ff, 0x4, 0xfffffffffffffff9, 0x4, 0x7fff, 0x0, 0xffff0001, 0x0, 0x2f}, r1, 0x4, r0, 0x2) ptrace(0x8, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @random="a28c3ffb4f19", @val={@val={0x9100, 0x6, 0x0, 0x4}, {0x8100, 0x0, 0x1, 0x4}}, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x26}, @multicast2, @random="218cad541720", @local}}}}, &(0x7f0000000140)={0x1, 0x1, [0xb65, 0x6cb, 0xe93, 0xd]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x412100, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x4, 0xffffffffffffffff, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xffffffff81000237}, 0xaaa0, 0x0, 0x200, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6, 0x40010, 0xffffffffffffffff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x4e21, 0x1, @local, 0x7}, 0x1c) ptrace$getenv(0x4201, r1, 0xba, &(0x7f0000000200)) recvfrom(0xffffffffffffffff, &(0x7f0000000280)=""/212, 0xd4, 0x40000000, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)={0x8020}) 15:25:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0xff, 0x1f, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff}, 0x1044, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff}) rename(&(0x7f0000000240)='./file1/../file0\x00', &(0x7f0000000540)='./file1\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000400)=0xffffffffffff4525) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef05000000f8088981beecd9456a028b5a0d7d6da10a8b16bf2bd2b67ed8b591800000000000", 0x7) chroot(&(0x7f0000000300)='./file0\x00') 15:25:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xd00000000000000) 15:25:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 8) [ 3115.808363] FAULT_INJECTION: forcing a failure. [ 3115.808363] name failslab, interval 1, probability 0, space 0, times 0 [ 3115.810685] CPU: 0 PID: 17373 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3115.812081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3115.812215] FAULT_INJECTION: forcing a failure. [ 3115.812215] name failslab, interval 1, probability 0, space 0, times 0 [ 3115.813768] Call Trace: [ 3115.813794] dump_stack+0x107/0x167 [ 3115.813821] should_fail.cold+0x5/0xa [ 3115.816896] ? create_object.isra.0+0x3a/0xa20 [ 3115.817837] should_failslab+0x5/0x20 [ 3115.818597] kmem_cache_alloc+0x5b/0x310 [ 3115.819418] create_object.isra.0+0x3a/0xa20 [ 3115.820324] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3115.821367] kmem_cache_alloc+0x159/0x310 [ 3115.822206] alloc_buffer_head+0x20/0x110 [ 3115.823033] alloc_page_buffers+0x14d/0x700 [ 3115.823904] create_empty_buffers+0x2c/0x640 [ 3115.824796] create_page_buffers+0x1bb/0x230 [ 3115.825691] __block_write_begin_int+0x1d1/0x19c0 [ 3115.826662] ? fat_add_cluster+0x100/0x100 [ 3115.827511] ? add_to_page_cache_locked+0x40/0x40 [ 3115.828477] ? __page_cache_alloc+0x10d/0x360 [ 3115.829412] ? remove_inode_buffers+0x300/0x300 [ 3115.830359] ? pagecache_get_page+0x243/0xc80 [ 3115.831271] ? perf_trace_lock+0xac/0x490 [ 3115.832114] ? wait_for_stable_page+0x92/0xe0 [ 3115.833024] cont_write_begin+0x472/0x980 [ 3115.833880] ? fat_add_cluster+0x100/0x100 [ 3115.834734] ? nobh_write_begin+0xed0/0xed0 [ 3115.835605] ? __mark_inode_dirty+0x93b/0xd40 [ 3115.836506] ? lock_downgrade+0x6d0/0x6d0 [ 3115.837369] ? do_raw_spin_lock+0x121/0x260 [ 3115.838239] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3115.839276] fat_write_begin+0x89/0x180 [ 3115.840086] ? fat_add_cluster+0x100/0x100 [ 3115.840951] generic_perform_write+0x20a/0x4f0 [ 3115.841886] ? fat_direct_IO+0x1ef/0x380 [ 3115.842714] ? page_cache_prev_miss+0x310/0x310 [ 3115.843678] __generic_file_write_iter+0x2cd/0x5d0 [ 3115.844679] generic_file_write_iter+0xdb/0x230 [ 3115.845633] ? iov_iter_init+0x3c/0x130 [ 3115.846451] new_sync_write+0x42c/0x660 [ 3115.847265] ? new_sync_read+0x6f0/0x6f0 [ 3115.848086] ? ksys_write+0x12d/0x260 [ 3115.848863] ? lock_release+0x680/0x680 [ 3115.849678] ? selinux_file_permission+0x92/0x520 [ 3115.850666] ? __fget_files+0x296/0x4c0 [ 3115.851486] vfs_write+0x747/0xa70 [ 3115.852219] ksys_write+0x12d/0x260 [ 3115.852963] ? __ia32_sys_read+0xb0/0xb0 [ 3115.853806] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3115.854879] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3115.855931] do_syscall_64+0x33/0x40 [ 3115.856675] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3115.857721] RIP: 0033:0x7fd0ff1b0b19 [ 3115.858474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3115.862208] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3115.863732] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3115.865156] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3115.866593] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3115.868021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3115.869468] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3115.870920] CPU: 1 PID: 17380 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3115.871659] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3115.872530] Call Trace: [ 3115.872808] dump_stack+0x107/0x167 [ 3115.873200] should_fail.cold+0x5/0xa [ 3115.873618] ? create_object.isra.0+0x3a/0xa20 [ 3115.874105] should_failslab+0x5/0x20 [ 3115.874508] kmem_cache_alloc+0x5b/0x310 [ 3115.874950] create_object.isra.0+0x3a/0xa20 [ 3115.875417] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3115.875963] kmem_cache_alloc+0x159/0x310 [ 3115.876411] alloc_buffer_head+0x20/0x110 [ 3115.876830] alloc_page_buffers+0x14d/0x700 [ 3115.877303] create_empty_buffers+0x2c/0x640 [ 3115.877775] create_page_buffers+0x1bb/0x230 [ 3115.878247] __block_write_begin_int+0x1d1/0x19c0 [ 3115.878774] ? fat_add_cluster+0x100/0x100 [ 3115.879223] ? add_to_page_cache_locked+0x40/0x40 [ 3115.879744] ? __page_cache_alloc+0x10d/0x360 [ 3115.880216] ? remove_inode_buffers+0x300/0x300 [ 3115.880713] ? pagecache_get_page+0x243/0xc80 [ 3115.881189] ? perf_trace_lock+0xac/0x490 [ 3115.881642] ? wait_for_stable_page+0x92/0xe0 [ 3115.882122] cont_write_begin+0x472/0x980 [ 3115.882566] ? fat_add_cluster+0x100/0x100 [ 3115.883012] ? nobh_write_begin+0xed0/0xed0 [ 3115.883471] ? __mark_inode_dirty+0x93b/0xd40 [ 3115.883954] ? lock_downgrade+0x6d0/0x6d0 [ 3115.884395] ? do_raw_spin_lock+0x121/0x260 [ 3115.884848] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3115.885399] fat_write_begin+0x89/0x180 [ 3115.885801] ? fat_add_cluster+0x100/0x100 [ 3115.886259] generic_perform_write+0x20a/0x4f0 [ 3115.886741] ? fat_direct_IO+0x1ef/0x380 [ 3115.887169] ? page_cache_prev_miss+0x310/0x310 [ 3115.887682] __generic_file_write_iter+0x2cd/0x5d0 [ 3115.888204] generic_file_write_iter+0xdb/0x230 [ 3115.888700] ? iov_iter_init+0x3c/0x130 [ 3115.889120] new_sync_write+0x42c/0x660 [ 3115.889546] ? new_sync_read+0x6f0/0x6f0 [ 3115.889978] ? ksys_write+0x12d/0x260 [ 3115.890377] ? lock_release+0x680/0x680 [ 3115.890798] ? selinux_file_permission+0x92/0x520 [ 3115.891310] ? __fget_files+0x296/0x4c0 [ 3115.891744] vfs_write+0x747/0xa70 [ 3115.892121] ksys_write+0x12d/0x260 [ 3115.892508] ? __ia32_sys_read+0xb0/0xb0 [ 3115.892939] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3115.893516] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3115.894080] do_syscall_64+0x33/0x40 [ 3115.894496] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3115.895046] RIP: 0033:0x7f7ec0254b19 [ 3115.895445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3115.897407] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3115.898208] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3115.898972] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3115.899728] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3115.900488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3115.901240] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 [ 3115.903093] attempt to access beyond end of device [ 3115.903093] loop4: rw=2049, want=21, limit=15 15:25:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 5) [ 3115.936492] attempt to access beyond end of device [ 3115.936492] loop3: rw=2049, want=21, limit=15 15:25:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 9) [ 3116.056957] FAULT_INJECTION: forcing a failure. [ 3116.056957] name failslab, interval 1, probability 0, space 0, times 0 [ 3116.058291] CPU: 1 PID: 17398 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3116.059052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3116.059939] Call Trace: [ 3116.060218] dump_stack+0x107/0x167 [ 3116.060617] should_fail.cold+0x5/0xa [ 3116.061039] ? create_object.isra.0+0x3a/0xa20 [ 3116.061579] should_failslab+0x5/0x20 [ 3116.062004] kmem_cache_alloc+0x5b/0x310 [ 3116.062470] create_object.isra.0+0x3a/0xa20 [ 3116.062955] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3116.063515] kmem_cache_alloc+0x159/0x310 [ 3116.063965] alloc_buffer_head+0x20/0x110 [ 3116.064423] alloc_page_buffers+0x14d/0x700 [ 3116.064908] create_empty_buffers+0x2c/0x640 [ 3116.065411] create_page_buffers+0x1bb/0x230 [ 3116.065902] __block_write_begin_int+0x1d1/0x19c0 [ 3116.066414] ? fat_add_cluster+0x100/0x100 [ 3116.066866] ? add_to_page_cache_locked+0x40/0x40 [ 3116.067373] ? __page_cache_alloc+0x10d/0x360 [ 3116.067851] ? remove_inode_buffers+0x300/0x300 [ 3116.068352] ? pagecache_get_page+0x243/0xc80 [ 3116.068830] ? perf_trace_lock+0xac/0x490 [ 3116.069247] ? wait_for_stable_page+0x92/0xe0 [ 3116.069735] cont_write_begin+0x472/0x980 [ 3116.070184] ? fat_add_cluster+0x100/0x100 [ 3116.070635] ? nobh_write_begin+0xed0/0xed0 [ 3116.071094] ? __mark_inode_dirty+0x93b/0xd40 [ 3116.071575] ? lock_downgrade+0x6d0/0x6d0 [ 3116.072014] ? do_raw_spin_lock+0x121/0x260 [ 3116.072473] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3116.073024] fat_write_begin+0x89/0x180 [ 3116.073450] ? fat_add_cluster+0x100/0x100 [ 3116.073907] generic_perform_write+0x20a/0x4f0 [ 3116.074397] ? fat_direct_IO+0x1ef/0x380 [ 3116.074829] ? page_cache_prev_miss+0x310/0x310 [ 3116.075337] __generic_file_write_iter+0x2cd/0x5d0 [ 3116.075858] generic_file_write_iter+0xdb/0x230 [ 3116.076347] ? iov_iter_init+0x3c/0x130 [ 3116.076773] new_sync_write+0x42c/0x660 [ 3116.077176] ? new_sync_read+0x6f0/0x6f0 [ 3116.077624] ? ksys_write+0x12d/0x260 [ 3116.078032] ? lock_release+0x680/0x680 [ 3116.078457] ? selinux_file_permission+0x92/0x520 [ 3116.078973] ? __fget_files+0x296/0x4c0 [ 3116.079401] vfs_write+0x747/0xa70 [ 3116.079791] ksys_write+0x12d/0x260 [ 3116.080179] ? __ia32_sys_read+0xb0/0xb0 [ 3116.080613] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3116.081165] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3116.081690] do_syscall_64+0x33/0x40 [ 3116.082086] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3116.082628] RIP: 0033:0x7f7ec0254b19 [ 3116.083027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3116.084951] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3116.085762] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3116.086510] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3116.087258] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3116.087968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3116.088722] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 15:25:21 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="0171c200000000000000000086dd6096033f00303a00fc020000000000000000000000000000ff1200000000000000000000000000010200907800000000600009e60000000000000000000000000000ffffac1e0001fe8000000000000000000000000000bb"], 0x0) syz_emit_ethernet(0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="00000802c2ff3d63f2ccde0000000000000000"], &(0x7f0000000180)={0x1, 0x4, [0x108, 0xb7e, 0xd85, 0xf2f]}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() setpgid(0x0, r1) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8, 0x7f, 0x1, 0x7a, 0x0, 0x4, 0x1, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0xc300, 0x4, 0x1ff, 0x4, 0xfffffffffffffff9, 0x4, 0x7fff, 0x0, 0xffff0001, 0x0, 0x2f}, r1, 0x4, r0, 0x2) ptrace(0x8, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @random="a28c3ffb4f19", @val={@val={0x9100, 0x6, 0x0, 0x4}, {0x8100, 0x0, 0x1, 0x4}}, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x26}, @multicast2, @random="218cad541720", @local}}}}, &(0x7f0000000140)={0x1, 0x1, [0xb65, 0x6cb, 0xe93, 0xd]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x412100, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x4, 0xffffffffffffffff, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xffffffff81000237}, 0xaaa0, 0x0, 0x200, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6, 0x40010, 0xffffffffffffffff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x4e21, 0x1, @local, 0x7}, 0x1c) ptrace$getenv(0x4201, r1, 0xba, &(0x7f0000000200)) recvfrom(0xffffffffffffffff, &(0x7f0000000280)=""/212, 0xd4, 0x40000000, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)={0x8020}) [ 3116.131182] FAULT_INJECTION: forcing a failure. [ 3116.131182] name failslab, interval 1, probability 0, space 0, times 0 [ 3116.132407] CPU: 1 PID: 17402 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3116.133144] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3116.134039] Call Trace: [ 3116.134323] dump_stack+0x107/0x167 [ 3116.134716] should_fail.cold+0x5/0xa [ 3116.135121] ? create_object.isra.0+0x3a/0xa20 [ 3116.135623] should_failslab+0x5/0x20 [ 3116.136029] kmem_cache_alloc+0x5b/0x310 [ 3116.136468] create_object.isra.0+0x3a/0xa20 [ 3116.136939] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3116.137487] kmem_cache_alloc+0x159/0x310 [ 3116.137942] alloc_buffer_head+0x20/0x110 [ 3116.138382] alloc_page_buffers+0x14d/0x700 [ 3116.138821] create_empty_buffers+0x2c/0x640 [ 3116.139297] create_page_buffers+0x1bb/0x230 [ 3116.139782] __block_write_begin_int+0x1d1/0x19c0 [ 3116.140317] ? fat_add_cluster+0x100/0x100 [ 3116.140779] ? add_to_page_cache_locked+0x40/0x40 [ 3116.141321] ? __page_cache_alloc+0x10d/0x360 [ 3116.141802] ? remove_inode_buffers+0x300/0x300 [ 3116.142310] ? pagecache_get_page+0x243/0xc80 [ 3116.142798] ? perf_trace_lock+0xac/0x490 [ 3116.143254] ? wait_for_stable_page+0x92/0xe0 [ 3116.143716] cont_write_begin+0x472/0x980 [ 3116.144164] ? fat_add_cluster+0x100/0x100 [ 3116.144627] ? nobh_write_begin+0xed0/0xed0 [ 3116.145103] ? __mark_inode_dirty+0x93b/0xd40 [ 3116.145611] ? lock_downgrade+0x6d0/0x6d0 [ 3116.146051] ? do_raw_spin_lock+0x121/0x260 [ 3116.146523] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3116.147074] fat_write_begin+0x89/0x180 [ 3116.147508] ? fat_add_cluster+0x100/0x100 [ 3116.147951] generic_perform_write+0x20a/0x4f0 [ 3116.148464] ? fat_direct_IO+0x1ef/0x380 [ 3116.148903] ? page_cache_prev_miss+0x310/0x310 [ 3116.149399] __generic_file_write_iter+0x2cd/0x5d0 [ 3116.149949] generic_file_write_iter+0xdb/0x230 [ 3116.150454] ? iov_iter_init+0x3c/0x130 [ 3116.150883] new_sync_write+0x42c/0x660 [ 3116.151307] ? new_sync_read+0x6f0/0x6f0 [ 3116.151742] ? ksys_write+0x12d/0x260 [ 3116.152154] ? lock_release+0x680/0x680 [ 3116.152580] ? selinux_file_permission+0x92/0x520 [ 3116.153095] ? __fget_files+0x296/0x4c0 [ 3116.153540] vfs_write+0x747/0xa70 [ 3116.153927] ksys_write+0x12d/0x260 [ 3116.154312] ? __ia32_sys_read+0xb0/0xb0 [ 3116.154757] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3116.155320] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3116.155874] do_syscall_64+0x33/0x40 [ 3116.156278] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3116.156828] RIP: 0033:0x7fd0ff1b0b19 [ 3116.157231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3116.159190] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3116.160016] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3116.160770] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3116.161547] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3116.162299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3116.163052] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 15:25:21 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:22 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x4040, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:25:22 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x29, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3116.247160] attempt to access beyond end of device [ 3116.247160] loop3: rw=2049, want=21, limit=15 [ 3116.248348] attempt to access beyond end of device [ 3116.248348] loop4: rw=2049, want=21, limit=15 15:25:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xe00000000000000) 15:25:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 10) 15:25:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 6) 15:25:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000780)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000540)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000400)=[{&(0x7f00000005c0)="038e511d107035f4657cb8541b90d3c5ea707b6b7baabfee59f087528a928442e53f838308aaa62e21ba17f2052b554739c028f5c3831582604c7a80a9da00c35b6b0c2174d3814edde7e582ac1451263cca56c0c5a86c3f6725b2834c32a4f30b7c09f3ca684e60ba66c844902f83d7a97ccceafe9b4043ed53b232c47809ec9b8dfdc888322f6eb58571011127d5240c2c3004af54812a4dd708a8c8cb534a1aff9c801ead6060c47a502816ca639f6d8c8d8a641af070832cdc8b76ad36222a3d82e27fab217538bb32659b4a724eb9d453ae732c74b932", 0xd9}, {&(0x7f00000006c0)="ff4705b489e3f6b4d59ba738e6f186b132cd49f0b12107d39d5104e3cbdd9bd9d1111208d1a778a8de3df4427779ba27259bf688cd00adb33ae55786cebe3a9f365e7d32c64f1240cd42e5959f47612bd4b6e637db5ef98474faebeb497e273f3e95136bfbb559e84d30a917f79a160827f2881a14c590b2f4b7acb56345b70a75253330b0b5b510be71906134934bef85ce7976332e4928d5d022020f2d561a3c991a02bd28d86e60277603d9e372eb84d45048dd7cc63d36ec9e56", 0xbc}], 0x2, &(0x7f00000007c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x78, 0x801}, 0x40080) fallocate(r0, 0x54, 0x6, 0x800040) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:25:22 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3116.475700] FAULT_INJECTION: forcing a failure. [ 3116.475700] name failslab, interval 1, probability 0, space 0, times 0 [ 3116.476937] CPU: 1 PID: 17432 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3116.477796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3116.478625] Call Trace: [ 3116.478912] dump_stack+0x107/0x167 [ 3116.479300] should_fail.cold+0x5/0xa [ 3116.479709] ? create_object.isra.0+0x3a/0xa20 [ 3116.480201] should_failslab+0x5/0x20 [ 3116.480609] kmem_cache_alloc+0x5b/0x310 [ 3116.481045] create_object.isra.0+0x3a/0xa20 [ 3116.481513] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3116.482051] kmem_cache_alloc+0x159/0x310 [ 3116.482475] alloc_buffer_head+0x20/0x110 [ 3116.482890] alloc_page_buffers+0x14d/0x700 [ 3116.483364] create_empty_buffers+0x2c/0x640 [ 3116.483836] create_page_buffers+0x1bb/0x230 [ 3116.484316] __block_write_begin_int+0x1d1/0x19c0 [ 3116.484841] ? fat_add_cluster+0x100/0x100 [ 3116.485313] ? add_to_page_cache_locked+0x40/0x40 [ 3116.485832] ? __page_cache_alloc+0x10d/0x360 [ 3116.486315] ? remove_inode_buffers+0x300/0x300 [ 3116.486814] ? pagecache_get_page+0x243/0xc80 [ 3116.487293] ? perf_trace_lock+0xac/0x490 [ 3116.487714] ? wait_for_stable_page+0x92/0xe0 [ 3116.488204] cont_write_begin+0x472/0x980 [ 3116.488663] ? fat_add_cluster+0x100/0x100 [ 3116.489109] ? nobh_write_begin+0xed0/0xed0 [ 3116.489588] ? __mark_inode_dirty+0x93b/0xd40 [ 3116.490073] ? lock_downgrade+0x6d0/0x6d0 [ 3116.490514] ? do_raw_spin_lock+0x121/0x260 [ 3116.490977] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3116.491517] fat_write_begin+0x89/0x180 [ 3116.491944] ? fat_add_cluster+0x100/0x100 [ 3116.492397] generic_perform_write+0x20a/0x4f0 [ 3116.492859] ? fat_direct_IO+0x1ef/0x380 [ 3116.493291] ? page_cache_prev_miss+0x310/0x310 [ 3116.493813] __generic_file_write_iter+0x2cd/0x5d0 [ 3116.494339] generic_file_write_iter+0xdb/0x230 [ 3116.494841] ? iov_iter_init+0x3c/0x130 [ 3116.495268] new_sync_write+0x42c/0x660 [ 3116.495692] ? new_sync_read+0x6f0/0x6f0 [ 3116.496130] ? ksys_write+0x12d/0x260 [ 3116.496537] ? lock_release+0x680/0x680 [ 3116.496957] ? selinux_file_permission+0x92/0x520 [ 3116.497498] ? __fget_files+0x296/0x4c0 [ 3116.497927] vfs_write+0x747/0xa70 [ 3116.498314] ksys_write+0x12d/0x260 [ 3116.498703] ? __ia32_sys_read+0xb0/0xb0 [ 3116.499141] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3116.499703] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3116.500251] do_syscall_64+0x33/0x40 [ 3116.500651] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3116.501198] RIP: 0033:0x7fd0ff1b0b19 [ 3116.501609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3116.503560] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3116.504370] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3116.505134] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3116.505900] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3116.506652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3116.507431] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3116.545607] attempt to access beyond end of device [ 3116.545607] loop3: rw=2049, want=21, limit=15 [ 3116.549854] FAULT_INJECTION: forcing a failure. [ 3116.549854] name failslab, interval 1, probability 0, space 0, times 0 [ 3116.552153] CPU: 1 PID: 17443 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3116.553548] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3116.555242] Call Trace: [ 3116.555775] dump_stack+0x107/0x167 [ 3116.556517] should_fail.cold+0x5/0xa [ 3116.557283] ? create_object.isra.0+0x3a/0xa20 [ 3116.558210] should_failslab+0x5/0x20 [ 3116.558974] kmem_cache_alloc+0x5b/0x310 [ 3116.559800] create_object.isra.0+0x3a/0xa20 [ 3116.560685] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3116.561716] kmem_cache_alloc+0x159/0x310 [ 3116.562556] alloc_buffer_head+0x20/0x110 [ 3116.563391] alloc_page_buffers+0x14d/0x700 [ 3116.564265] create_empty_buffers+0x2c/0x640 [ 3116.565158] create_page_buffers+0x1bb/0x230 [ 3116.566066] __block_write_begin_int+0x1d1/0x19c0 [ 3116.567040] ? fat_add_cluster+0x100/0x100 [ 3116.567890] ? add_to_page_cache_locked+0x40/0x40 [ 3116.568856] ? __page_cache_alloc+0x10d/0x360 [ 3116.569770] ? remove_inode_buffers+0x300/0x300 [ 3116.570702] ? pagecache_get_page+0x243/0xc80 [ 3116.571603] ? perf_trace_lock+0xac/0x490 [ 3116.572439] ? wait_for_stable_page+0x92/0xe0 [ 3116.573351] cont_write_begin+0x472/0x980 [ 3116.574193] ? fat_add_cluster+0x100/0x100 [ 3116.575040] ? nobh_write_begin+0xed0/0xed0 [ 3116.575899] ? __mark_inode_dirty+0x93b/0xd40 [ 3116.576793] ? lock_downgrade+0x6d0/0x6d0 [ 3116.577640] ? do_raw_spin_lock+0x121/0x260 [ 3116.578504] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3116.579529] fat_write_begin+0x89/0x180 [ 3116.580324] ? fat_add_cluster+0x100/0x100 [ 3116.581178] generic_perform_write+0x20a/0x4f0 [ 3116.582111] ? fat_direct_IO+0x1ef/0x380 [ 3116.582924] ? page_cache_prev_miss+0x310/0x310 [ 3116.583875] __generic_file_write_iter+0x2cd/0x5d0 [ 3116.584866] generic_file_write_iter+0xdb/0x230 [ 3116.585813] ? iov_iter_init+0x3c/0x130 [ 3116.586619] new_sync_write+0x42c/0x660 [ 3116.587421] ? new_sync_read+0x6f0/0x6f0 [ 3116.588249] ? ksys_write+0x12d/0x260 [ 3116.589025] ? lock_release+0x680/0x680 [ 3116.589833] ? selinux_file_permission+0x92/0x520 [ 3116.590808] ? __fget_files+0x296/0x4c0 [ 3116.591622] vfs_write+0x747/0xa70 [ 3116.592353] ksys_write+0x12d/0x260 [ 3116.593089] ? __ia32_sys_read+0xb0/0xb0 [ 3116.593935] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3116.594994] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3116.596043] do_syscall_64+0x33/0x40 [ 3116.596800] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3116.597848] RIP: 0033:0x7f7ec0254b19 [ 3116.598606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3116.602321] RSP: 002b:00007f7ebd7a9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3116.603851] RAX: ffffffffffffffda RBX: 00007f7ec0368020 RCX: 00007f7ec0254b19 [ 3116.605285] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000006 [ 3116.606727] RBP: 00007f7ebd7a91d0 R08: 0000000000000000 R09: 0000000000000000 [ 3116.608161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3116.609611] R13: 00007ffe3db9302f R14: 00007f7ebd7a9300 R15: 0000000000022000 [ 3116.619203] attempt to access beyond end of device [ 3116.619203] loop4: rw=2049, want=21, limit=15 15:25:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 7) 15:25:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) (fail_nth: 1) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 11) 15:25:36 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x52, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000400)='./file0\x00') 15:25:36 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r2, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000400)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ioctl$sock_inet_udp_SIOCINQ(r5, 0x541b, &(0x7f0000000540)) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) chroot(&(0x7f0000000300)='./file1\x00') 15:25:36 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xf00000000000000) 15:25:36 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="0171c200000000000000000086dd6096033f00303a00fc020000000000000000000000000000ff1200000000000000000000000000010200907800000000600009e60000000000000000000000000000ffffac1e0001fe8000000000000000000000000000bb"], 0x0) syz_emit_ethernet(0xf, &(0x7f0000000080)=ANY=[@ANYBLOB="00000802c2ff3d63f2ccde0000000000000000"], &(0x7f0000000180)={0x1, 0x4, [0x108, 0xb7e, 0xd85, 0xf2f]}) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() setpgid(0x0, r1) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8, 0x7f, 0x1, 0x7a, 0x0, 0x4, 0x1, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8000, 0x2, @perf_bp={&(0x7f00000001c0), 0x2}, 0xc300, 0x4, 0x1ff, 0x4, 0xfffffffffffffff9, 0x4, 0x7fff, 0x0, 0xffff0001, 0x0, 0x2f}, r1, 0x4, r0, 0x2) ptrace(0x8, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @random="a28c3ffb4f19", @val={@val={0x9100, 0x6, 0x0, 0x4}, {0x8100, 0x0, 0x1, 0x4}}, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x26}, @multicast2, @random="218cad541720", @local}}}}, &(0x7f0000000140)={0x1, 0x1, [0xb65, 0x6cb, 0xe93, 0xd]}) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x412100, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x5, 0x4, 0xffffffffffffffff, 0x8060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xffffffff81000237}, 0xaaa0, 0x0, 0x200, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6, 0x40010, 0xffffffffffffffff, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x4e21, 0x1, @local, 0x7}, 0x1c) ptrace$getenv(0x4201, r1, 0xba, &(0x7f0000000200)) recvfrom(0xffffffffffffffff, &(0x7f0000000280)=""/212, 0xd4, 0x40000000, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)={0x8020}) [ 3130.739022] FAULT_INJECTION: forcing a failure. [ 3130.739022] name failslab, interval 1, probability 0, space 0, times 0 [ 3130.741826] CPU: 1 PID: 17468 Comm: syz-executor.1 Not tainted 5.10.201 #1 [ 3130.743326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3130.745129] Call Trace: [ 3130.745717] dump_stack+0x107/0x167 [ 3130.746285] FAULT_INJECTION: forcing a failure. [ 3130.746285] name failslab, interval 1, probability 0, space 0, times 0 [ 3130.746516] should_fail.cold+0x5/0xa [ 3130.746543] ? kvmalloc_node+0x119/0x170 [ 3130.746572] should_failslab+0x5/0x20 [ 3130.751615] __kmalloc_node+0x76/0x420 [ 3130.752471] kvmalloc_node+0x119/0x170 [ 3130.753311] seq_read_iter+0x81c/0x12b0 [ 3130.754188] ? __lockdep_reset_lock+0x180/0x180 [ 3130.755198] seq_read+0x3dd/0x5b0 [ 3130.755950] ? seq_read_iter+0x12b0/0x12b0 [ 3130.756863] ? _cond_resched+0x12/0x80 [ 3130.757732] ? avc_policy_seqno+0x9/0x70 [ 3130.758620] ? selinux_file_permission+0x92/0x520 [ 3130.759681] ? seq_read_iter+0x12b0/0x12b0 [ 3130.760605] vfs_read+0x228/0x580 [ 3130.761363] __x64_sys_pread64+0x201/0x260 [ 3130.762293] ? ksys_pread64+0x1b0/0x1b0 [ 3130.763160] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3130.764301] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3130.765417] do_syscall_64+0x33/0x40 [ 3130.766238] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3130.767355] RIP: 0033:0x7f3370a6db19 [ 3130.768173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3130.772208] RSP: 002b:00007f336dfe3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 3130.773870] RAX: ffffffffffffffda RBX: 00007f3370b80f60 RCX: 00007f3370a6db19 [ 3130.775433] RDX: 000000000000100b RSI: 00000000200001c0 RDI: 0000000000000004 [ 3130.776992] RBP: 00007f336dfe31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3130.778558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3130.780119] R13: 00007ffcb710039f R14: 00007f336dfe3300 R15: 0000000000022000 [ 3130.781731] CPU: 0 PID: 17464 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3130.783391] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3130.785362] Call Trace: [ 3130.786024] dump_stack+0x107/0x167 [ 3130.786917] should_fail.cold+0x5/0xa [ 3130.787845] ? create_object.isra.0+0x3a/0xa20 [ 3130.788777] FAULT_INJECTION: forcing a failure. [ 3130.788777] name failslab, interval 1, probability 0, space 0, times 0 [ 3130.788943] should_failslab+0x5/0x20 [ 3130.788976] kmem_cache_alloc+0x5b/0x310 [ 3130.789007] create_object.isra.0+0x3a/0xa20 [ 3130.794359] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3130.795541] kmem_cache_alloc+0x159/0x310 [ 3130.796514] alloc_buffer_head+0x20/0x110 [ 3130.797497] alloc_page_buffers+0x14d/0x700 [ 3130.798510] create_empty_buffers+0x2c/0x640 [ 3130.799542] create_page_buffers+0x1bb/0x230 [ 3130.800571] __block_write_begin_int+0x1d1/0x19c0 [ 3130.801702] ? fat_add_cluster+0x100/0x100 [ 3130.802687] ? add_to_page_cache_locked+0x40/0x40 [ 3130.803810] ? __page_cache_alloc+0x10d/0x360 [ 3130.804850] ? remove_inode_buffers+0x300/0x300 [ 3130.805934] ? pagecache_get_page+0x243/0xc80 [ 3130.806983] ? perf_trace_lock+0xac/0x490 [ 3130.807960] ? wait_for_stable_page+0x92/0xe0 [ 3130.809014] cont_write_begin+0x472/0x980 [ 3130.810003] ? fat_add_cluster+0x100/0x100 [ 3130.810976] ? nobh_write_begin+0xed0/0xed0 [ 3130.811967] ? __mark_inode_dirty+0x93b/0xd40 [ 3130.813012] ? lock_downgrade+0x6d0/0x6d0 [ 3130.813976] ? do_raw_spin_lock+0x121/0x260 [ 3130.814968] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3130.816145] fat_write_begin+0x89/0x180 [ 3130.817061] ? fat_add_cluster+0x100/0x100 [ 3130.818057] generic_perform_write+0x20a/0x4f0 [ 3130.819113] ? fat_direct_IO+0x1ef/0x380 [ 3130.820053] ? page_cache_prev_miss+0x310/0x310 [ 3130.821158] __generic_file_write_iter+0x2cd/0x5d0 [ 3130.822312] generic_file_write_iter+0xdb/0x230 [ 3130.823384] ? iov_iter_init+0x3c/0x130 [ 3130.824318] new_sync_write+0x42c/0x660 [ 3130.825244] ? new_sync_read+0x6f0/0x6f0 [ 3130.826192] ? ksys_write+0x12d/0x260 [ 3130.827083] ? lock_release+0x680/0x680 [ 3130.828007] ? selinux_file_permission+0x92/0x520 [ 3130.829127] ? __fget_files+0x296/0x4c0 [ 3130.830073] vfs_write+0x747/0xa70 [ 3130.830914] ksys_write+0x12d/0x260 [ 3130.831759] ? __ia32_sys_read+0xb0/0xb0 [ 3130.832706] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3130.833931] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3130.835137] do_syscall_64+0x33/0x40 [ 3130.836004] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3130.837190] RIP: 0033:0x7f7ec0254b19 [ 3130.838062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3130.842340] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3130.844093] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3130.845766] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3130.847418] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3130.849069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3130.850736] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 [ 3130.852424] CPU: 1 PID: 17480 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3130.853956] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3130.855766] Call Trace: [ 3130.856340] dump_stack+0x107/0x167 [ 3130.857148] should_fail.cold+0x5/0xa [ 3130.857995] ? ext4_find_extent+0xa3d/0xd30 [ 3130.858940] should_failslab+0x5/0x20 [ 3130.859939] __kmalloc+0x72/0x390 [ 3130.860704] ext4_find_extent+0xa3d/0xd30 [ 3130.861757] ? kfree+0xd7/0x340 [ 3130.862495] ext4_ext_map_blocks+0x1c8/0x5850 [ 3130.863501] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3130.864670] ? perf_trace_lock+0xac/0x490 [ 3130.865608] ? ext4_ext_release+0x10/0x10 [ 3130.866523] ? ext4_map_blocks+0x5e0/0x1940 [ 3130.867470] ? lock_release+0x680/0x680 [ 3130.868334] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 3130.869373] ? find_held_lock+0x2c/0x110 [ 3130.870303] ? down_write+0xe0/0x160 [ 3130.871121] ? down_write_killable+0x180/0x180 [ 3130.872133] ext4_map_blocks+0x652/0x1940 [ 3130.873051] ? kmem_cache_alloc+0x2a6/0x310 [ 3130.874002] ? __kernel_text_address+0x9/0x40 [ 3130.874993] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3130.875979] ? jbd2__journal_start+0xf3/0x7e0 [ 3130.876971] ? __ext4_journal_start_sb+0x214/0x390 [ 3130.878063] ? __ext4_journal_start_sb+0x1db/0x390 [ 3130.879141] ext4_iomap_begin+0x3ad/0x700 [ 3130.880068] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 3130.881140] ? kasan_save_stack+0x1b/0x40 [ 3130.882067] ? ext4_file_write_iter+0xb26/0x18d0 [ 3130.883116] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 3130.884512] ? lock_chain_count+0x20/0x20 [ 3130.885428] ? __lockdep_reset_lock+0x180/0x180 [ 3130.886470] iomap_apply+0x164/0x810 [ 3130.887289] ? iomap_dio_rw+0x90/0x90 [ 3130.888131] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 3130.889409] ? mark_held_locks+0x9e/0xe0 [ 3130.890340] ? filemap_check_errors+0xa5/0x150 [ 3130.891353] __iomap_dio_rw+0x6cd/0x1110 [ 3130.892243] ? iomap_dio_rw+0x90/0x90 [ 3130.893145] ? iomap_dio_bio_actor+0xef0/0xef0 [ 3130.894161] ? ext4_orphan_add+0x253/0x9e0 [ 3130.895091] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 3130.896174] ? ext4_empty_dir+0xae0/0xae0 [ 3130.897085] ? jbd2__journal_start+0xf3/0x7e0 [ 3130.898095] iomap_dio_rw+0x31/0x90 [ 3130.898898] ext4_file_write_iter+0xb26/0x18d0 [ 3130.899923] ? ext4_file_read_iter+0x4c0/0x4c0 [ 3130.900935] ? __lockdep_reset_lock+0x180/0x180 [ 3130.901942] ? __lockdep_reset_lock+0x180/0x180 [ 3130.902951] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3130.904093] new_sync_write+0x42c/0x660 [ 3130.904954] ? new_sync_read+0x6f0/0x6f0 [ 3130.905849] ? ksys_write+0x12d/0x260 [ 3130.906675] ? lock_release+0x680/0x680 [ 3130.907534] ? selinux_file_permission+0x92/0x520 [ 3130.908582] ? __fget_files+0x296/0x4c0 [ 3130.909464] vfs_write+0x747/0xa70 [ 3130.910259] ksys_write+0x12d/0x260 [ 3130.911058] ? __ia32_sys_read+0xb0/0xb0 [ 3130.911952] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3130.913098] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3130.914257] do_syscall_64+0x33/0x40 [ 3130.915077] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3130.916194] RIP: 0033:0x7fd0ff1b0b19 [ 3130.917031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3130.920974] RSP: 002b:00007fd0fc705188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3130.922615] RAX: ffffffffffffffda RBX: 00007fd0ff2c4020 RCX: 00007fd0ff1b0b19 [ 3130.924148] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000005 [ 3130.925701] RBP: 00007fd0fc7051d0 R08: 0000000000000000 R09: 0000000000000000 [ 3130.927248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3130.928817] R13: 00007ffe26656eef R14: 00007fd0fc705300 R15: 0000000000022000 [ 3130.931933] attempt to access beyond end of device [ 3130.931933] loop4: rw=2049, want=21, limit=15 15:25:51 executing program 0: chdir(0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000380)={0x24, @short={0x2, 0xffff}}, 0x14) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x200f5ef, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x20002000) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=ANY=[@ANYBLOB="00fb1d0259363f7c3977dd94bd1e5d20949b0318493b749742c3d4943b"], 0x1d, 0x1) syz_open_dev$vcsu(0x0, 0x0, 0x28140) pwrite64(r1, &(0x7f0000000300)="af", 0xfffffeb2, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x199) 15:25:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 12) 15:25:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0xf01000000000000) 15:25:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f0000000540)="81a08c06c51ab7222ab6074d25", 0xd}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000400)={@ipv4={'\x00', '\xff\xff', @local}, 0x20}) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) chroot(&(0x7f0000000300)='./file1\x00') 15:25:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) (fail_nth: 2) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x7b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:51 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x800, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x40802, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:25:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 8) [ 3145.939249] FAULT_INJECTION: forcing a failure. [ 3145.939249] name failslab, interval 1, probability 0, space 0, times 0 [ 3145.941998] CPU: 0 PID: 17516 Comm: syz-executor.1 Not tainted 5.10.201 #1 [ 3145.943602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3145.945381] Call Trace: [ 3145.945937] dump_stack+0x107/0x167 [ 3145.946687] should_fail.cold+0x5/0xa [ 3145.947470] ? create_object.isra.0+0x3a/0xa20 [ 3145.948399] should_failslab+0x5/0x20 [ 3145.949181] kmem_cache_alloc+0x5b/0x310 [ 3145.950026] create_object.isra.0+0x3a/0xa20 [ 3145.950934] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3145.951979] __kmalloc_node+0x1ae/0x420 [ 3145.952815] kvmalloc_node+0x119/0x170 [ 3145.953615] seq_read_iter+0x81c/0x12b0 [ 3145.954465] ? __lockdep_reset_lock+0x180/0x180 [ 3145.955501] seq_read+0x3dd/0x5b0 [ 3145.956278] ? seq_read_iter+0x12b0/0x12b0 [ 3145.957222] ? _cond_resched+0x12/0x80 [ 3145.958104] ? avc_policy_seqno+0x9/0x70 [ 3145.959009] ? selinux_file_permission+0x92/0x520 [ 3145.960104] ? seq_read_iter+0x12b0/0x12b0 [ 3145.961045] vfs_read+0x228/0x580 [ 3145.961839] __x64_sys_pread64+0x201/0x260 [ 3145.962772] ? ksys_pread64+0x1b0/0x1b0 [ 3145.963573] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3145.964619] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3145.965651] do_syscall_64+0x33/0x40 [ 3145.966425] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3145.967447] RIP: 0033:0x7f3370a6db19 [ 3145.968199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3145.971992] RSP: 002b:00007f336dfe3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 3145.973701] RAX: ffffffffffffffda RBX: 00007f3370b80f60 RCX: 00007f3370a6db19 [ 3145.975286] RDX: 000000000000100b RSI: 00000000200001c0 RDI: 0000000000000004 [ 3145.976867] RBP: 00007f336dfe31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3145.978600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3145.980199] R13: 00007ffcb710039f R14: 00007f336dfe3300 R15: 0000000000022000 [ 3146.012238] FAULT_INJECTION: forcing a failure. [ 3146.012238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3146.015220] CPU: 0 PID: 17522 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3146.016701] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3146.018765] Call Trace: [ 3146.019318] dump_stack+0x107/0x167 [ 3146.020227] should_fail.cold+0x5/0xa [ 3146.021020] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 3146.022347] ? fat_write_begin+0x95/0x180 [ 3146.023199] ? fat_add_cluster+0x100/0x100 [ 3146.024292] ? fat_write_begin+0xa3/0x180 [ 3146.025230] generic_perform_write+0x279/0x4f0 [ 3146.026383] ? fat_direct_IO+0x1ef/0x380 [ 3146.027295] ? page_cache_prev_miss+0x310/0x310 [ 3146.028358] __generic_file_write_iter+0x2cd/0x5d0 [ 3146.029464] generic_file_write_iter+0xdb/0x230 [ 3146.030523] ? iov_iter_init+0x3c/0x130 [ 3146.031423] new_sync_write+0x42c/0x660 [ 3146.032319] ? new_sync_read+0x6f0/0x6f0 [ 3146.033224] ? ksys_write+0x12d/0x260 [ 3146.034093] ? lock_release+0x680/0x680 [ 3146.034958] ? selinux_file_permission+0x92/0x520 [ 3146.035927] ? __fget_files+0x296/0x4c0 [ 3146.036732] vfs_write+0x747/0xa70 [ 3146.037451] ksys_write+0x12d/0x260 [ 3146.038186] ? __ia32_sys_read+0xb0/0xb0 [ 3146.039010] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3146.040055] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3146.041085] do_syscall_64+0x33/0x40 [ 3146.041855] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3146.042878] RIP: 0033:0x7fd0ff1b0b19 [ 3146.043632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3146.047345] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3146.048885] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3146.050345] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3146.051885] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3146.053467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3146.055059] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3146.073489] FAULT_INJECTION: forcing a failure. [ 3146.073489] name failslab, interval 1, probability 0, space 0, times 0 [ 3146.076020] CPU: 0 PID: 17511 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3146.077475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3146.079147] Call Trace: [ 3146.079687] dump_stack+0x107/0x167 [ 3146.080420] should_fail.cold+0x5/0xa [ 3146.081199] ? create_object.isra.0+0x3a/0xa20 [ 3146.082121] should_failslab+0x5/0x20 [ 3146.082887] kmem_cache_alloc+0x5b/0x310 [ 3146.083699] ? entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3146.084769] create_object.isra.0+0x3a/0xa20 [ 3146.085638] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3146.086657] kmem_cache_alloc+0x159/0x310 [ 3146.087477] ? __kernel_text_address+0x9/0x40 [ 3146.088382] jbd2__journal_start+0x190/0x7e0 [ 3146.089260] __ext4_journal_start_sb+0x214/0x390 [ 3146.090229] ext4_iomap_begin+0x485/0x700 [ 3146.091065] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 3146.092055] ? kasan_save_stack+0x1b/0x40 [ 3146.092875] ? ext4_file_write_iter+0xb26/0x18d0 [ 3146.093840] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 3146.095115] ? lock_chain_count+0x20/0x20 [ 3146.095947] ? __lockdep_reset_lock+0x180/0x180 [ 3146.096884] iomap_apply+0x164/0x810 [ 3146.097636] ? iomap_dio_rw+0x90/0x90 [ 3146.098417] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 3146.099574] ? mark_held_locks+0x9e/0xe0 [ 3146.100398] ? filemap_check_errors+0xa5/0x150 [ 3146.101312] __iomap_dio_rw+0x6cd/0x1110 [ 3146.102126] ? iomap_dio_rw+0x90/0x90 [ 3146.102907] ? iomap_dio_bio_actor+0xef0/0xef0 [ 3146.103816] ? ext4_orphan_add+0x253/0x9e0 [ 3146.104654] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 3146.105633] ? ext4_empty_dir+0xae0/0xae0 [ 3146.106488] ? jbd2__journal_start+0xf3/0x7e0 [ 3146.107387] iomap_dio_rw+0x31/0x90 [ 3146.108104] ext4_file_write_iter+0xb26/0x18d0 [ 3146.109023] ? ext4_file_read_iter+0x4c0/0x4c0 [ 3146.109937] ? __lockdep_reset_lock+0x180/0x180 [ 3146.110854] ? __lockdep_reset_lock+0x180/0x180 [ 3146.111765] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3146.112807] new_sync_write+0x42c/0x660 [ 3146.113586] ? new_sync_read+0x6f0/0x6f0 [ 3146.114400] ? ksys_write+0x12d/0x260 [ 3146.115155] ? lock_release+0x680/0x680 [ 3146.115944] ? selinux_file_permission+0x92/0x520 [ 3146.116890] ? __fget_files+0x296/0x4c0 [ 3146.117703] vfs_write+0x747/0xa70 [ 3146.118412] ksys_write+0x12d/0x260 [ 3146.119136] ? __ia32_sys_read+0xb0/0xb0 [ 3146.119938] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3146.120980] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3146.122014] do_syscall_64+0x33/0x40 [ 3146.122776] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3146.123779] RIP: 0033:0x7f7ec0254b19 [ 3146.124516] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3146.128395] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3146.130117] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3146.131697] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000005 [ 3146.133291] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3146.134885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3146.136475] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 15:25:52 executing program 7: bind$802154_dgram(0xffffffffffffffff, &(0x7f00000073c0)={0x24, @short={0x2, 0x3, 0xaaa3}}, 0x14) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) openat(0xffffffffffffffff, &(0x7f0000000400)='.\x00', 0x0, 0x21) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:25:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) (fail_nth: 3) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0xdc, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3146.373937] FAULT_INJECTION: forcing a failure. [ 3146.373937] name fail_usercopy, interval 1, probability 0, space 0, times 0 15:25:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x1000000000000000) [ 3146.376824] CPU: 0 PID: 17542 Comm: syz-executor.1 Not tainted 5.10.201 #1 [ 3146.378411] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3146.380173] Call Trace: [ 3146.380737] dump_stack+0x107/0x167 [ 3146.381522] should_fail.cold+0x5/0xa [ 3146.382350] _copy_to_iter+0x264/0x12d0 [ 3146.383202] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 3146.384361] ? _copy_from_iter_nocache+0xd60/0xd60 [ 3146.385403] ? __check_object_size+0x75/0x440 [ 3146.386360] ? __virt_addr_valid+0x128/0x350 [ 3146.387353] ? __check_object_size+0x319/0x440 [ 3146.388386] seq_read_iter+0xdcb/0x12b0 [ 3146.389303] seq_read+0x3dd/0x5b0 [ 3146.390106] ? seq_read_iter+0x12b0/0x12b0 [ 3146.391058] ? _cond_resched+0x12/0x80 [ 3146.391941] ? avc_policy_seqno+0x9/0x70 [ 3146.392854] ? selinux_file_permission+0x92/0x520 [ 3146.393966] ? seq_read_iter+0x12b0/0x12b0 [ 3146.394873] vfs_read+0x228/0x580 [ 3146.395584] __x64_sys_pread64+0x201/0x260 [ 3146.396440] ? ksys_pread64+0x1b0/0x1b0 [ 3146.397250] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3146.398315] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3146.399362] do_syscall_64+0x33/0x40 [ 3146.400116] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3146.401150] RIP: 0033:0x7f3370a6db19 [ 3146.401925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3146.405651] RSP: 002b:00007f336dfe3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 3146.407201] RAX: ffffffffffffffda RBX: 00007f3370b80f60 RCX: 00007f3370a6db19 [ 3146.408642] RDX: 000000000000100b RSI: 00000000200001c0 RDI: 0000000000000004 [ 3146.410089] RBP: 00007f336dfe31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3146.411535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3146.412974] R13: 00007ffcb710039f R14: 00007f336dfe3300 R15: 0000000000022000 [ 3146.432850] attempt to access beyond end of device [ 3146.432850] loop3: rw=2049, want=29, limit=15 15:25:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) unlink(&(0x7f0000000400)='./file1\x00') chroot(&(0x7f0000000300)='./file1\x00') 15:25:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 13) 15:25:52 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:25:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 9) [ 3146.699620] FAULT_INJECTION: forcing a failure. [ 3146.699620] name failslab, interval 1, probability 0, space 0, times 0 [ 3146.701994] CPU: 1 PID: 17568 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3146.703398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3146.705070] Call Trace: [ 3146.705611] dump_stack+0x107/0x167 [ 3146.706387] should_fail.cold+0x5/0xa [ 3146.707164] ? ext4_find_extent+0xa3d/0xd30 [ 3146.708029] should_failslab+0x5/0x20 [ 3146.708793] __kmalloc+0x72/0x390 [ 3146.709504] ext4_find_extent+0xa3d/0xd30 [ 3146.710355] ? kfree+0xd7/0x340 [ 3146.711030] ext4_ext_map_blocks+0x1c8/0x5850 [ 3146.711949] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3146.713003] ? perf_trace_lock+0xac/0x490 [ 3146.713851] ? ext4_ext_release+0x10/0x10 [ 3146.714684] ? ext4_map_blocks+0x5e0/0x1940 [ 3146.715550] ? lock_release+0x680/0x680 [ 3146.716344] ? ext4_es_lookup_extent+0x48d/0xaa0 [ 3146.717290] ? find_held_lock+0x2c/0x110 [ 3146.718138] ? down_write+0xe0/0x160 [ 3146.718885] ? down_write_killable+0x180/0x180 [ 3146.719811] ext4_map_blocks+0x652/0x1940 [ 3146.720651] ? kmem_cache_alloc+0x2a6/0x310 [ 3146.721511] ? __kernel_text_address+0x9/0x40 [ 3146.722421] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 3146.723326] ? jbd2__journal_start+0xf3/0x7e0 [ 3146.724237] ? __ext4_journal_start_sb+0x214/0x390 [ 3146.725226] ? __ext4_journal_start_sb+0x1db/0x390 [ 3146.726232] ext4_iomap_begin+0x3ad/0x700 [ 3146.727089] ? ext4_iomap_begin_report+0x5a0/0x5a0 [ 3146.728079] ? kasan_save_stack+0x1b/0x40 [ 3146.728919] ? ext4_file_write_iter+0xb26/0x18d0 [ 3146.729899] ? truncate_exceptional_pvec_entries.part.0+0x510/0x510 [ 3146.731172] ? lock_chain_count+0x20/0x20 [ 3146.732012] ? __lockdep_reset_lock+0x180/0x180 [ 3146.732944] iomap_apply+0x164/0x810 [ 3146.733705] ? iomap_dio_rw+0x90/0x90 [ 3146.734474] ? trace_event_raw_event_iomap_apply+0x430/0x430 [ 3146.735695] ? mark_held_locks+0x9e/0xe0 [ 3146.736521] ? filemap_check_errors+0xa5/0x150 [ 3146.737439] __iomap_dio_rw+0x6cd/0x1110 [ 3146.738270] ? iomap_dio_rw+0x90/0x90 [ 3146.739058] ? iomap_dio_bio_actor+0xef0/0xef0 [ 3146.739970] ? ext4_orphan_add+0x253/0x9e0 [ 3146.740813] ? jbd2_buffer_abort_trigger+0x80/0x80 [ 3146.741815] ? ext4_empty_dir+0xae0/0xae0 [ 3146.742655] ? jbd2__journal_start+0xf3/0x7e0 [ 3146.743564] iomap_dio_rw+0x31/0x90 [ 3146.744302] ext4_file_write_iter+0xb26/0x18d0 [ 3146.745237] ? ext4_file_read_iter+0x4c0/0x4c0 [ 3146.746178] ? __lockdep_reset_lock+0x180/0x180 [ 3146.747112] ? __lockdep_reset_lock+0x180/0x180 [ 3146.748054] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3146.749113] new_sync_write+0x42c/0x660 [ 3146.749947] ? new_sync_read+0x6f0/0x6f0 [ 3146.750772] ? ksys_write+0x12d/0x260 [ 3146.751543] ? lock_release+0x680/0x680 [ 3146.752338] ? selinux_file_permission+0x92/0x520 [ 3146.753307] ? __fget_files+0x296/0x4c0 [ 3146.754133] vfs_write+0x747/0xa70 [ 3146.754857] ksys_write+0x12d/0x260 [ 3146.755583] ? __ia32_sys_read+0xb0/0xb0 [ 3146.756399] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3146.757441] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3146.758491] do_syscall_64+0x33/0x40 [ 3146.759237] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3146.760256] RIP: 0033:0x7fd0ff1b0b19 [ 3146.760998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3146.764677] RSP: 002b:00007fd0fc705188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3146.766206] RAX: ffffffffffffffda RBX: 00007fd0ff2c4020 RCX: 00007fd0ff1b0b19 [ 3146.767626] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000005 [ 3146.769043] RBP: 00007fd0fc7051d0 R08: 0000000000000000 R09: 0000000000000000 [ 3146.770479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3146.771896] R13: 00007ffe26656eef R14: 00007fd0fc705300 R15: 0000000000022000 [ 3146.815235] FAT-fs (loop6): Unrecognized mount option "./file2" or missing value [ 3146.966011] FAULT_INJECTION: forcing a failure. [ 3146.966011] name failslab, interval 1, probability 0, space 0, times 0 [ 3146.968520] CPU: 1 PID: 17583 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3146.969946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3146.971607] Call Trace: [ 3146.972141] dump_stack+0x107/0x167 [ 3146.972881] should_fail.cold+0x5/0xa [ 3146.973666] ? create_object.isra.0+0x3a/0xa20 [ 3146.974606] should_failslab+0x5/0x20 [ 3146.975389] kmem_cache_alloc+0x5b/0x310 [ 3146.976231] create_object.isra.0+0x3a/0xa20 [ 3146.977130] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3146.978183] kmem_cache_alloc+0x159/0x310 [ 3146.979037] alloc_buffer_head+0x20/0x110 [ 3146.979880] alloc_page_buffers+0x14d/0x700 [ 3146.980772] create_empty_buffers+0x2c/0x640 [ 3146.981707] create_page_buffers+0x1bb/0x230 [ 3146.982616] __block_write_begin_int+0x1d1/0x19c0 [ 3146.983609] ? fat_add_cluster+0x100/0x100 [ 3146.984470] ? add_to_page_cache_locked+0x40/0x40 [ 3146.985441] ? __page_cache_alloc+0x10d/0x360 [ 3146.986350] ? remove_inode_buffers+0x300/0x300 [ 3146.987288] ? pagecache_get_page+0x243/0xc80 [ 3146.988184] ? perf_trace_lock+0xac/0x490 [ 3146.989022] ? wait_for_stable_page+0x92/0xe0 [ 3146.989930] cont_write_begin+0x472/0x980 [ 3146.990778] ? fat_add_cluster+0x100/0x100 [ 3146.991621] ? nobh_write_begin+0xed0/0xed0 [ 3146.992482] ? __mark_inode_dirty+0x93b/0xd40 [ 3146.993377] ? lock_downgrade+0x6d0/0x6d0 [ 3146.994231] ? do_raw_spin_lock+0x121/0x260 [ 3146.995103] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3146.996126] fat_write_begin+0x89/0x180 [ 3146.996930] ? fat_add_cluster+0x100/0x100 [ 3146.997789] generic_perform_write+0x20a/0x4f0 [ 3146.998711] ? fat_direct_IO+0x1ef/0x380 [ 3146.999533] ? page_cache_prev_miss+0x310/0x310 [ 3147.000483] __generic_file_write_iter+0x2cd/0x5d0 [ 3147.001471] generic_file_write_iter+0xdb/0x230 [ 3147.002421] ? iov_iter_init+0x3c/0x130 [ 3147.003224] new_sync_write+0x42c/0x660 [ 3147.004022] ? new_sync_read+0x6f0/0x6f0 [ 3147.004840] ? ksys_write+0x12d/0x260 [ 3147.005607] ? lock_release+0x680/0x680 [ 3147.006415] ? selinux_file_permission+0x92/0x520 [ 3147.007395] ? __fget_files+0x296/0x4c0 [ 3147.008205] vfs_write+0x747/0xa70 [ 3147.008934] ksys_write+0x12d/0x260 [ 3147.009664] ? __ia32_sys_read+0xb0/0xb0 [ 3147.010510] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3147.011564] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3147.012605] do_syscall_64+0x33/0x40 [ 3147.013355] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3147.014389] RIP: 0033:0x7f7ec0254b19 [ 3147.015139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3147.018839] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3147.020359] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3147.021792] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3147.023214] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3147.024641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3147.026068] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 15:25:53 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00') chroot(&(0x7f0000000040)='./file0/file0\x00') 15:25:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) (fail_nth: 4) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 14) 15:25:53 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x12c, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:25:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x1000070000000000) 15:25:53 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file2\x00', 0x109001, 0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x50000, 0x49) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') [ 3147.210663] attempt to access beyond end of device [ 3147.210663] loop4: rw=2049, want=21, limit=15 [ 3147.214268] FAULT_INJECTION: forcing a failure. [ 3147.214268] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3147.216945] CPU: 1 PID: 17589 Comm: syz-executor.1 Not tainted 5.10.201 #1 [ 3147.218366] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3147.220036] Call Trace: [ 3147.220576] dump_stack+0x107/0x167 [ 3147.221321] should_fail.cold+0x5/0xa [ 3147.222105] _copy_to_user+0x2e/0x180 [ 3147.222874] simple_read_from_buffer+0xcc/0x160 [ 3147.223808] proc_fail_nth_read+0x198/0x230 [ 3147.224673] ? proc_sessionid_read+0x230/0x230 [ 3147.225586] ? security_file_permission+0x24e/0x570 [ 3147.226600] ? perf_trace_initcall_start+0x101/0x380 [ 3147.227624] ? proc_sessionid_read+0x230/0x230 [ 3147.228538] vfs_read+0x228/0x580 [ 3147.229245] ksys_read+0x12d/0x260 [ 3147.229972] ? vfs_write+0xa70/0xa70 [ 3147.230725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3147.231781] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3147.232821] do_syscall_64+0x33/0x40 [ 3147.233572] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3147.234611] RIP: 0033:0x7f3370a2069c [ 3147.235359] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3147.239013] RSP: 002b:00007f336dfe3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3147.240535] RAX: ffffffffffffffda RBX: 0000000000000c15 RCX: 00007f3370a2069c [ 3147.241963] RDX: 000000000000000f RSI: 00007f336dfe31e0 RDI: 0000000000000005 [ 3147.243388] RBP: 00007f336dfe31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3147.244809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3147.246243] R13: 00007ffcb710039f R14: 00007f336dfe3300 R15: 0000000000022000 [ 3147.286776] FAULT_INJECTION: forcing a failure. [ 3147.286776] name failslab, interval 1, probability 0, space 0, times 0 [ 3147.289350] CPU: 1 PID: 17594 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3147.290774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3147.292410] Call Trace: [ 3147.292931] dump_stack+0x107/0x167 [ 3147.293822] should_fail.cold+0x5/0xa [ 3147.294579] ? mempool_alloc+0x148/0x360 [ 3147.295496] ? mempool_free_pages+0x20/0x20 [ 3147.296450] should_failslab+0x5/0x20 [ 3147.297332] kmem_cache_alloc+0x5b/0x310 [ 3147.298216] ? mempool_free_pages+0x20/0x20 [ 3147.299097] mempool_alloc+0x148/0x360 [ 3147.300015] ? mempool_resize+0x7d0/0x7d0 [ 3147.301000] ? __lock_acquire+0xbb1/0x5b00 [ 3147.301921] bio_alloc_bioset+0x36e/0x600 [ 3147.302878] ? bvec_alloc+0x2f0/0x2f0 [ 3147.303635] ? perf_trace_lock+0xac/0x490 [ 3147.304475] mpage_alloc+0x2f/0x260 [ 3147.305206] __mpage_writepage+0x114e/0x1670 [ 3147.306111] ? clean_buffers+0x2a0/0x2a0 [ 3147.307061] ? page_mapped+0x18b/0x350 [ 3147.307911] ? find_get_pages_range_tag+0x5c9/0xbf0 [ 3147.309085] ? page_mkclean+0x151/0x2c0 [ 3147.309895] ? invalid_page_referenced_vma+0x570/0x570 [ 3147.311041] ? find_get_pages_contig+0x9c0/0x9c0 [ 3147.312102] ? mark_held_locks+0x9e/0xe0 [ 3147.312998] ? percpu_counter_add_batch+0x8b/0x140 [ 3147.314111] ? clear_page_dirty_for_io+0x216/0x7c0 [ 3147.315221] write_cache_pages+0x57f/0xe50 [ 3147.316088] ? clean_buffers+0x2a0/0x2a0 [ 3147.316965] ? clear_page_dirty_for_io+0x7c0/0x7c0 [ 3147.318036] ? create_page_buffers+0x139/0x230 [ 3147.319074] ? perf_trace_lock+0xac/0x490 [ 3147.319887] ? perf_trace_lock+0xac/0x490 [ 3147.320695] ? lock_chain_count+0x20/0x20 [ 3147.321510] ? __lockdep_reset_lock+0x180/0x180 [ 3147.322426] ? xas_set_mark+0x282/0x2f0 [ 3147.323217] ? find_held_lock+0x2c/0x110 [ 3147.324020] ? fat_add_cluster+0x100/0x100 [ 3147.324846] ? fat_readahead+0x20/0x20 [ 3147.325603] mpage_writepages+0xd8/0x230 [ 3147.326571] ? mpage_end_io+0x2c0/0x2c0 [ 3147.327351] ? lock_downgrade+0x6d0/0x6d0 [ 3147.328167] ? fat_add_cluster+0x100/0x100 [ 3147.329142] ? mark_buffer_dirty+0x346/0x3d0 [ 3147.330180] do_writepages+0xee/0x2a0 [ 3147.330984] ? page_writeback_cpu_online+0x20/0x20 [ 3147.332063] ? iov_iter_advance+0x23b/0xec0 [ 3147.332928] __filemap_fdatawrite_range+0x24b/0x2f0 [ 3147.333913] ? delete_from_page_cache_batch+0xa30/0xa30 [ 3147.334959] ? page_cache_prev_miss+0x310/0x310 [ 3147.335875] filemap_write_and_wait_range+0x65/0x100 [ 3147.336865] __generic_file_write_iter+0x303/0x5d0 [ 3147.337838] generic_file_write_iter+0xdb/0x230 [ 3147.338839] ? iov_iter_init+0x3c/0x130 [ 3147.339785] new_sync_write+0x42c/0x660 [ 3147.340597] ? new_sync_read+0x6f0/0x6f0 [ 3147.341497] ? ksys_write+0x12d/0x260 [ 3147.342381] ? lock_release+0x680/0x680 [ 3147.343315] ? selinux_file_permission+0x92/0x520 [ 3147.344314] ? __fget_files+0x296/0x4c0 [ 3147.345111] vfs_write+0x747/0xa70 [ 3147.345835] ksys_write+0x12d/0x260 [ 3147.346550] ? __ia32_sys_read+0xb0/0xb0 [ 3147.347356] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3147.348472] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3147.349482] do_syscall_64+0x33/0x40 [ 3147.350231] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3147.351222] RIP: 0033:0x7fd0ff1b0b19 [ 3147.352031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3147.355963] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3147.357654] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3147.359046] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3147.360424] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3147.361919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3147.363299] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3147.367256] attempt to access beyond end of device [ 3147.367256] loop3: rw=2049, want=21, limit=15 15:26:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 10) 15:26:08 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x15d, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:26:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x1200000000000000) 15:26:08 executing program 0: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x208001, 0x20) clock_adjtime(0x0, &(0x7f0000000100)={0x8733, 0x678, 0x0, 0x401, 0xfffffffffffffffc, 0x7, 0x80, 0x1000000000, 0x0, 0x0, 0x1, 0x0, 0x0, 0xcee8, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x40000000000, 0x4}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, 0x0, 0x4009000) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f0000000000)) r2 = socket$packet(0x11, 0x3, 0x300) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffb) clock_gettime(0x0, &(0x7f00000003c0)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001c40), 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 15:26:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x100b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:26:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 15) 15:26:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0xe) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x2, 0x4}, 0x0, 0xffffffff7fffffff, 0xffffffffffffffff, 0xa) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') fcntl$addseals(r0, 0x409, 0x9) write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') 15:26:08 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r3, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000006a800)={0x3ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x80, "c4b04bcf570301"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f000006b800)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0x1, "c04205c0388b13"}) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) chroot(&(0x7f0000000300)='./file1\x00') [ 3162.917406] FAULT_INJECTION: forcing a failure. [ 3162.917406] name failslab, interval 1, probability 0, space 0, times 0 [ 3162.920164] CPU: 1 PID: 17634 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3162.921595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3162.923267] Call Trace: [ 3162.923811] dump_stack+0x107/0x167 [ 3162.924552] should_fail.cold+0x5/0xa [ 3162.925340] ? mempool_alloc+0x148/0x360 [ 3162.926178] ? mempool_free_pages+0x20/0x20 [ 3162.927056] should_failslab+0x5/0x20 [ 3162.927828] kmem_cache_alloc+0x5b/0x310 [ 3162.928672] ? mempool_free_pages+0x20/0x20 [ 3162.929533] mempool_alloc+0x148/0x360 [ 3162.930362] ? __lockdep_reset_lock+0x180/0x180 [ 3162.931305] ? mempool_resize+0x7d0/0x7d0 [ 3162.932158] ? lock_acquire+0x197/0x470 [ 3162.932976] ? find_held_lock+0x2c/0x110 [ 3162.933815] bio_alloc_bioset+0x36e/0x600 [ 3162.934669] ? bvec_alloc+0x2f0/0x2f0 [ 3162.935446] ? __brelse+0x84/0xa0 [ 3162.936183] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 3162.937199] __bread_gfp+0x166/0x3a0 [ 3162.937977] fat12_ent_bread+0x144/0x420 [ 3162.938798] ? mark_lock+0xf5/0x2df0 [ 3162.939551] fat_alloc_clusters+0x571/0xf30 [ 3162.940491] ? fat_ent_write+0x1a0/0x1a0 [ 3162.941397] ? __lock_acquire+0xbb1/0x5b00 [ 3162.942416] ? __lock_acquire+0x1657/0x5b00 [ 3162.943320] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3162.944446] ? perf_trace_lock+0xac/0x490 [ 3162.945312] fat_add_cluster+0x6d/0x100 [ 3162.946148] ? fat_fill_super+0x36e0/0x36e0 [ 3162.947025] ? lock_release+0x680/0x680 [ 3162.947829] ? fat_bmap+0x200/0x460 [ 3162.948571] fat_get_block+0x5b3/0x940 [ 3162.949390] ? fat_add_cluster+0x100/0x100 [ 3162.950265] ? create_empty_buffers+0x4a3/0x640 [ 3162.951213] ? create_page_buffers+0x139/0x230 [ 3162.952139] __block_write_begin_int+0x3d1/0x19c0 [ 3162.953178] ? fat_add_cluster+0x100/0x100 [ 3162.954152] ? remove_inode_buffers+0x300/0x300 [ 3162.955156] ? pagecache_get_page+0x243/0xc80 [ 3162.956063] ? perf_trace_lock+0xac/0x490 [ 3162.956975] ? wait_for_stable_page+0x92/0xe0 [ 3162.957930] cont_write_begin+0x472/0x980 [ 3162.958814] ? fat_add_cluster+0x100/0x100 [ 3162.959692] ? nobh_write_begin+0xed0/0xed0 [ 3162.960559] ? __mark_inode_dirty+0x93b/0xd40 [ 3162.961540] ? lock_downgrade+0x6d0/0x6d0 [ 3162.962501] ? do_raw_spin_lock+0x121/0x260 [ 3162.963423] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3162.964470] fat_write_begin+0x89/0x180 [ 3162.965223] FAULT_INJECTION: forcing a failure. [ 3162.965223] name failslab, interval 1, probability 0, space 0, times 0 [ 3162.965295] ? fat_add_cluster+0x100/0x100 [ 3162.968395] generic_perform_write+0x20a/0x4f0 [ 3162.969340] ? fat_direct_IO+0x1ef/0x380 [ 3162.970191] ? page_cache_prev_miss+0x310/0x310 [ 3162.971169] __generic_file_write_iter+0x2cd/0x5d0 [ 3162.972191] generic_file_write_iter+0xdb/0x230 [ 3162.973145] ? iov_iter_init+0x3c/0x130 [ 3162.974187] new_sync_write+0x42c/0x660 [ 3162.975214] ? new_sync_read+0x6f0/0x6f0 [ 3162.976256] ? ksys_write+0x12d/0x260 [ 3162.977247] ? lock_release+0x680/0x680 [ 3162.978285] ? selinux_file_permission+0x92/0x520 [ 3162.979473] ? __fget_files+0x296/0x4c0 [ 3162.980489] vfs_write+0x747/0xa70 [ 3162.981240] ksys_write+0x12d/0x260 [ 3162.982018] ? __ia32_sys_read+0xb0/0xb0 [ 3162.982875] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3162.983961] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3162.985022] do_syscall_64+0x33/0x40 [ 3162.985797] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3162.986880] RIP: 0033:0x7f7ec0254b19 [ 3162.987652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3162.991397] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3162.992960] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3162.994429] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3162.995906] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3162.997355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3162.998820] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 [ 3163.000323] CPU: 0 PID: 17630 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3163.002025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3163.004030] Call Trace: [ 3163.004668] dump_stack+0x107/0x167 [ 3163.005559] should_fail.cold+0x5/0xa [ 3163.006500] ? mempool_alloc+0x148/0x360 [ 3163.007484] ? mempool_free_pages+0x20/0x20 [ 3163.008534] should_failslab+0x5/0x20 [ 3163.009462] kmem_cache_alloc+0x5b/0x310 [ 3163.010474] ? mempool_free_pages+0x20/0x20 [ 3163.011519] mempool_alloc+0x148/0x360 [ 3163.012473] ? mempool_resize+0x7d0/0x7d0 [ 3163.013485] ? mempool_resize+0x7d0/0x7d0 [ 3163.014376] bvec_alloc+0xd8/0x2f0 [ 3163.015251] bio_alloc_bioset+0x40a/0x600 [ 3163.016109] ? bvec_alloc+0x2f0/0x2f0 [ 3163.017041] ? perf_trace_lock+0xac/0x490 [ 3163.017933] mpage_alloc+0x2f/0x260 [ 3163.018824] __mpage_writepage+0x114e/0x1670 [ 3163.019730] ? clean_buffers+0x2a0/0x2a0 [ 3163.020723] ? page_mapped+0x18b/0x350 [ 3163.021499] ? find_get_pages_range_tag+0x5c9/0xbf0 [ 3163.022630] ? page_mkclean+0x151/0x2c0 [ 3163.023423] ? invalid_page_referenced_vma+0x570/0x570 [ 3163.024461] ? find_get_pages_contig+0x9c0/0x9c0 [ 3163.025463] ? mark_held_locks+0x9e/0xe0 [ 3163.026315] ? percpu_counter_add_batch+0x8b/0x140 [ 3163.027516] ? clear_page_dirty_for_io+0x216/0x7c0 [ 3163.028503] write_cache_pages+0x57f/0xe50 [ 3163.029618] ? clean_buffers+0x2a0/0x2a0 [ 3163.030558] ? clear_page_dirty_for_io+0x7c0/0x7c0 [ 3163.031655] ? create_page_buffers+0x139/0x230 [ 3163.032676] ? perf_trace_lock+0xac/0x490 [ 3163.033616] ? perf_trace_lock+0xac/0x490 [ 3163.034558] ? lock_chain_count+0x20/0x20 [ 3163.035493] ? __lockdep_reset_lock+0x180/0x180 [ 3163.036527] ? xas_set_mark+0x282/0x2f0 [ 3163.037426] ? find_held_lock+0x2c/0x110 [ 3163.038363] ? fat_add_cluster+0x100/0x100 [ 3163.039330] ? fat_readahead+0x20/0x20 [ 3163.040200] mpage_writepages+0xd8/0x230 [ 3163.041115] ? mpage_end_io+0x2c0/0x2c0 [ 3163.042023] ? lock_downgrade+0x6d0/0x6d0 [ 3163.042953] ? fat_add_cluster+0x100/0x100 [ 3163.043921] ? mark_buffer_dirty+0x346/0x3d0 [ 3163.044914] do_writepages+0xee/0x2a0 [ 3163.045777] ? page_writeback_cpu_online+0x20/0x20 [ 3163.046897] ? iov_iter_advance+0x23b/0xec0 [ 3163.047883] __filemap_fdatawrite_range+0x24b/0x2f0 [ 3163.048998] ? delete_from_page_cache_batch+0xa30/0xa30 [ 3163.049783] attempt to access beyond end of device [ 3163.049783] loop4: rw=2049, want=21, limit=15 [ 3163.050227] ? page_cache_prev_miss+0x310/0x310 [ 3163.053327] filemap_write_and_wait_range+0x65/0x100 [ 3163.054474] __generic_file_write_iter+0x303/0x5d0 [ 3163.055569] generic_file_write_iter+0xdb/0x230 [ 3163.056594] ? iov_iter_init+0x3c/0x130 [ 3163.057481] new_sync_write+0x42c/0x660 [ 3163.058377] ? new_sync_read+0x6f0/0x6f0 [ 3163.059280] ? ksys_write+0x12d/0x260 [ 3163.060131] ? lock_release+0x680/0x680 [ 3163.061012] ? selinux_file_permission+0x92/0x520 [ 3163.062109] ? __fget_files+0x296/0x4c0 [ 3163.063006] vfs_write+0x747/0xa70 [ 3163.063807] ksys_write+0x12d/0x260 [ 3163.064620] ? __ia32_sys_read+0xb0/0xb0 [ 3163.065528] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3163.066703] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3163.067857] do_syscall_64+0x33/0x40 [ 3163.068692] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3163.069878] RIP: 0033:0x7fd0ff1b0b19 [ 3163.070797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3163.074866] RSP: 002b:00007fd0fc726188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3163.076553] RAX: ffffffffffffffda RBX: 00007fd0ff2c3f60 RCX: 00007fd0ff1b0b19 [ 3163.078143] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3163.079718] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3163.081294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3163.082889] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3163.097607] attempt to access beyond end of device [ 3163.097607] loop3: rw=2049, want=21, limit=15 15:26:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x29, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:26:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = epoll_create1(0x0) close(r1) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0xfffffffffffffff9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x7fff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x7, 0x9, 0x400, 0x100, 0x3, 0xa48}) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) 15:26:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 11) 15:26:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 15:26:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x18e, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3163.447541] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 3163.454450] FAULT_INJECTION: forcing a failure. [ 3163.454450] name failslab, interval 1, probability 0, space 0, times 0 [ 3163.456772] CPU: 0 PID: 17663 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3163.458321] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3163.460003] Call Trace: [ 3163.460654] dump_stack+0x107/0x167 [ 3163.461391] should_fail.cold+0x5/0xa [ 3163.462332] ? create_object.isra.0+0x3a/0xa20 [ 3163.463262] should_failslab+0x5/0x20 [ 3163.464099] kmem_cache_alloc+0x5b/0x310 [ 3163.464963] create_object.isra.0+0x3a/0xa20 [ 3163.465949] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3163.467161] kmem_cache_alloc+0x159/0x310 [ 3163.468147] ? mempool_free_pages+0x20/0x20 [ 3163.469171] mempool_alloc+0x148/0x360 [ 3163.470108] ? __lockdep_reset_lock+0x180/0x180 [ 3163.471210] ? mempool_resize+0x7d0/0x7d0 [ 3163.472195] ? lock_acquire+0x197/0x470 [ 3163.473126] ? find_held_lock+0x2c/0x110 [ 3163.474112] bio_alloc_bioset+0x36e/0x600 [ 3163.475060] ? bvec_alloc+0x2f0/0x2f0 [ 3163.475877] ? __brelse+0x84/0xa0 [ 3163.476624] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 3163.477666] __bread_gfp+0x166/0x3a0 [ 3163.478490] fat12_ent_bread+0x144/0x420 [ 3163.479431] ? mark_lock+0xf5/0x2df0 [ 3163.480315] fat_alloc_clusters+0x571/0xf30 [ 3163.481346] ? is_dynamic_key+0x1e0/0x1e0 [ 3163.482348] ? fat_ent_write+0x1a0/0x1a0 [ 3163.483304] ? __lock_acquire+0xbb1/0x5b00 [ 3163.484320] ? __lock_acquire+0x1657/0x5b00 [ 3163.485358] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3163.486796] ? perf_trace_lock+0xac/0x490 [ 3163.487980] fat_add_cluster+0x6d/0x100 [ 3163.489094] ? fat_fill_super+0x36e0/0x36e0 [ 3163.490331] ? lock_release+0x680/0x680 [ 3163.491320] ? fat_bmap+0x200/0x460 [ 3163.492197] fat_get_block+0x5b3/0x940 [ 3163.493126] ? fat_add_cluster+0x100/0x100 [ 3163.494141] ? create_empty_buffers+0x4a3/0x640 [ 3163.495247] ? create_page_buffers+0x139/0x230 [ 3163.496357] __block_write_begin_int+0x3d1/0x19c0 [ 3163.497537] ? fat_add_cluster+0x100/0x100 [ 3163.498582] ? remove_inode_buffers+0x300/0x300 [ 3163.499582] ? pagecache_get_page+0x243/0xc80 [ 3163.500522] ? perf_trace_lock+0xac/0x490 [ 3163.501404] ? wait_for_stable_page+0x92/0xe0 [ 3163.502381] cont_write_begin+0x472/0x980 [ 3163.503276] ? fat_add_cluster+0x100/0x100 [ 3163.504115] ? nobh_write_begin+0xed0/0xed0 [ 3163.505018] ? __mark_inode_dirty+0x93b/0xd40 [ 3163.505976] ? lock_downgrade+0x6d0/0x6d0 [ 3163.506863] ? do_raw_spin_lock+0x121/0x260 [ 3163.507782] ? iov_iter_fault_in_readable+0x9a/0x410 [ 3163.508975] fat_write_begin+0x89/0x180 [ 3163.509936] ? fat_add_cluster+0x100/0x100 [ 3163.511007] generic_perform_write+0x20a/0x4f0 [ 3163.512134] ? fat_direct_IO+0x1ef/0x380 [ 3163.513108] ? page_cache_prev_miss+0x310/0x310 [ 3163.514276] __generic_file_write_iter+0x2cd/0x5d0 [ 3163.515488] generic_file_write_iter+0xdb/0x230 [ 3163.516618] ? iov_iter_init+0x3c/0x130 [ 3163.517593] new_sync_write+0x42c/0x660 [ 3163.518560] ? new_sync_read+0x6f0/0x6f0 [ 3163.519490] ? ksys_write+0x12d/0x260 [ 3163.520342] ? lock_release+0x680/0x680 [ 3163.521197] ? selinux_file_permission+0x92/0x520 [ 3163.522274] ? __fget_files+0x296/0x4c0 [ 3163.523150] vfs_write+0x747/0xa70 [ 3163.523916] ksys_write+0x12d/0x260 [ 3163.524715] ? __ia32_sys_read+0xb0/0xb0 [ 3163.525608] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3163.526754] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3163.527893] do_syscall_64+0x33/0x40 [ 3163.528702] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3163.529802] RIP: 0033:0x7f7ec0254b19 [ 3163.530592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3163.535019] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3163.536792] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3163.538509] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3163.540153] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3163.541840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3163.543556] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 [ 3163.555586] attempt to access beyond end of device [ 3163.555586] loop4: rw=2049, want=21, limit=15 [ 3163.642663] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 15:26:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = epoll_create1(0x0) close(r1) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0xfffffffffffffff9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x7fff, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4300, 0x4) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000000c0)={0x7, 0x9, 0x400, 0x100, 0x3, 0xa48}) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1, 0x0, 0x0, 0x3}, 0x200000}], 0x7ffff000, 0x0) 15:26:27 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x1bf, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/364]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:26:27 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x9, 0x8, 0x3f, 0x8, 0x0, 0x4, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x45226, 0xfffffffffffffffc, 0x4, 0x3, 0x800, 0x8, 0x6, 0x0, 0x1ff, 0x0, 0x6}, r1, 0x0, 0xffffffffffffffff, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x13, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x2d3a, 0x0, 0x0, 0x0, 0x36) 15:26:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 16) 15:26:27 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x800, 0x4) r0 = memfd_create(&(0x7f0000000340)='\x00', 0x2) pwritev2(r0, &(0x7f0000000440)=[{&(0x7f00000002c0)="81", 0x1}], 0x1, 0x7ffd, 0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x4) chdir(&(0x7f0000000040)='./file0\x00') mount$cgroup(0x0, 0x0, &(0x7f0000000100), 0x180010, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='./file2\x00') write(0xffffffffffffffff, &(0x7f0000000480)="f462f9d275313dc63d9643515de810e87441195408a828e9e2f3d4069e4483782f6b624cb6e14441e2b89dc3eb2f329a0551627007902bb46813648a16d21c6ddebc6c433a6714a81ebdefd2a876209805a3a5d51183dcd13b7ff2014afad80cc013bc2c2e70b87d69fd29e89eeef0757134e79a45e049348f2bf7fc596b1a79c0dce4a5e1f7b6189d25d90706", 0x8d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.dequeue\x00', 0x0, 0x0) creat(&(0x7f0000000540)='./file1\x00', 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f00000003c0)={0x6, 'team0\x00', {}, 0xc3e}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(r1, &(0x7f0000000380)="0249e99a7f0211ef77a2e6ddf80889819eecd945439d8a17fd966a028b5a0d7d6da10a8b16bf2bf2b67ed8b591", 0x2d) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) chroot(&(0x7f0000000300)='./file1\x00') memfd_create(&(0x7f0000000400)='^-]!$-\x00', 0xc) 15:26:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="a3", 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x1f00000000000000) 15:26:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x52, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:26:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 12) [ 3181.628406] FAULT_INJECTION: forcing a failure. [ 3181.628406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3181.631081] CPU: 0 PID: 17697 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3181.632545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3181.634265] Call Trace: [ 3181.634806] dump_stack+0x107/0x167 [ 3181.635563] should_fail.cold+0x5/0xa [ 3181.636359] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 3181.637469] ? fat_write_begin+0x95/0x180 [ 3181.638323] ? fat_add_cluster+0x100/0x100 [ 3181.639181] ? fat_write_begin+0xa3/0x180 [ 3181.640031] generic_perform_write+0x279/0x4f0 [ 3181.640966] ? fat_direct_IO+0x1ef/0x380 [ 3181.641792] ? page_cache_prev_miss+0x310/0x310 [ 3181.642775] __generic_file_write_iter+0x2cd/0x5d0 [ 3181.643776] generic_file_write_iter+0xdb/0x230 [ 3181.644722] ? iov_iter_init+0x3c/0x130 [ 3181.645539] new_sync_write+0x42c/0x660 [ 3181.646356] ? new_sync_read+0x6f0/0x6f0 [ 3181.647189] ? ksys_write+0x12d/0x260 [ 3181.647974] ? lock_release+0x680/0x680 [ 3181.648781] ? selinux_file_permission+0x92/0x520 [ 3181.649764] ? __fget_files+0x296/0x4c0 [ 3181.650596] vfs_write+0x747/0xa70 [ 3181.651328] ksys_write+0x12d/0x260 [ 3181.652070] ? __ia32_sys_read+0xb0/0xb0 [ 3181.652901] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3181.653968] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3181.655038] do_syscall_64+0x33/0x40 [ 3181.655801] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3181.656844] RIP: 0033:0x7f7ec0254b19 [ 3181.657606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3181.661350] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3181.662905] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3181.664358] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3181.665804] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3181.667278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3181.668725] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 [ 3181.674909] attempt to access beyond end of device [ 3181.674909] loop4: rw=2049, want=29, limit=15 [ 3181.685381] FAULT_INJECTION: forcing a failure. [ 3181.685381] name failslab, interval 1, probability 0, space 0, times 0 [ 3181.688035] CPU: 0 PID: 17708 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3181.689453] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3181.691171] Call Trace: [ 3181.691711] dump_stack+0x107/0x167 [ 3181.692464] should_fail.cold+0x5/0xa [ 3181.693247] ? create_object.isra.0+0x3a/0xa20 [ 3181.694200] should_failslab+0x5/0x20 [ 3181.694984] kmem_cache_alloc+0x5b/0x310 [ 3181.695813] ? lock_chain_count+0x20/0x20 [ 3181.696670] create_object.isra.0+0x3a/0xa20 [ 3181.697576] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 3181.698637] kmem_cache_alloc+0x159/0x310 [ 3181.699493] ? mempool_free_pages+0x20/0x20 [ 3181.700372] mempool_alloc+0x148/0x360 [ 3181.701174] ? mempool_resize+0x7d0/0x7d0 [ 3181.702031] ? __lock_acquire+0xbb1/0x5b00 [ 3181.702908] bio_alloc_bioset+0x36e/0x600 [ 3181.703757] ? bvec_alloc+0x2f0/0x2f0 [ 3181.704536] ? perf_trace_lock+0xac/0x490 [ 3181.705392] mpage_alloc+0x2f/0x260 [ 3181.706160] __mpage_writepage+0x114e/0x1670 [ 3181.707082] ? clean_buffers+0x2a0/0x2a0 [ 3181.707928] ? page_mapped+0x18b/0x350 [ 3181.708728] ? find_get_pages_range_tag+0x5c9/0xbf0 [ 3181.709759] ? page_mkclean+0x151/0x2c0 [ 3181.710587] ? invalid_page_referenced_vma+0x570/0x570 [ 3181.711649] ? find_get_pages_contig+0x9c0/0x9c0 [ 3181.712616] ? mark_held_locks+0x9e/0xe0 [ 3181.713441] ? percpu_counter_add_batch+0x8b/0x140 [ 3181.714450] ? clear_page_dirty_for_io+0x216/0x7c0 [ 3181.715450] write_cache_pages+0x57f/0xe50 [ 3181.716313] ? clean_buffers+0x2a0/0x2a0 [ 3181.717148] ? clear_page_dirty_for_io+0x7c0/0x7c0 [ 3181.718161] ? perf_trace_lock+0xac/0x490 [ 3181.719003] ? perf_trace_lock+0xac/0x490 [ 3181.719843] ? lock_chain_count+0x20/0x20 [ 3181.720689] ? __lockdep_reset_lock+0x180/0x180 [ 3181.721633] ? xas_set_mark+0x282/0x2f0 [ 3181.722462] ? find_held_lock+0x2c/0x110 [ 3181.723293] ? fat_add_cluster+0x100/0x100 [ 3181.724154] ? fat_readahead+0x20/0x20 [ 3181.724948] mpage_writepages+0xd8/0x230 [ 3181.725775] ? mpage_end_io+0x2c0/0x2c0 [ 3181.726595] ? lock_downgrade+0x6d0/0x6d0 [ 3181.727438] ? fat_add_cluster+0x100/0x100 [ 3181.728314] ? mark_buffer_dirty+0x346/0x3d0 [ 3181.729210] do_writepages+0xee/0x2a0 [ 3181.729988] ? page_writeback_cpu_online+0x20/0x20 [ 3181.731000] ? iov_iter_advance+0x23b/0xec0 [ 3181.731893] __filemap_fdatawrite_range+0x24b/0x2f0 [ 3181.732902] ? delete_from_page_cache_batch+0xa30/0xa30 [ 3181.733987] ? page_cache_prev_miss+0x310/0x310 [ 3181.734946] filemap_write_and_wait_range+0x65/0x100 [ 3181.735972] __generic_file_write_iter+0x303/0x5d0 [ 3181.736970] generic_file_write_iter+0xdb/0x230 [ 3181.737905] ? iov_iter_init+0x3c/0x130 [ 3181.738727] new_sync_write+0x42c/0x660 [ 3181.739534] ? new_sync_read+0x6f0/0x6f0 [ 3181.740354] ? ksys_write+0x12d/0x260 [ 3181.741129] ? lock_release+0x680/0x680 [ 3181.741931] ? selinux_file_permission+0x92/0x520 [ 3181.742919] ? __fget_files+0x296/0x4c0 [ 3181.743737] vfs_write+0x747/0xa70 [ 3181.744463] ksys_write+0x12d/0x260 [ 3181.745206] ? __ia32_sys_read+0xb0/0xb0 [ 3181.746033] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3181.747105] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3181.748154] do_syscall_64+0x33/0x40 [ 3181.748911] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3181.749945] RIP: 0033:0x7fd0ff1b0b19 [ 3181.750709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3181.754423] RSP: 002b:00007fd0fc705188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3181.755956] RAX: ffffffffffffffda RBX: 00007fd0ff2c4020 RCX: 00007fd0ff1b0b19 [ 3181.757392] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000006 [ 3181.758836] RBP: 00007fd0fc7051d0 R08: 0000000000000000 R09: 0000000000000000 [ 3181.760272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3181.761708] R13: 00007ffe26656eef R14: 00007fd0fc705300 R15: 0000000000022000 [ 3181.813003] attempt to access beyond end of device [ 3181.813003] loop3: rw=2049, want=21, limit=15 15:26:27 executing program 6: stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0xfc, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) 15:26:27 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x46e7}}, './file0\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x6}, 0x1c) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000100)={{r2}, "c6b5566c1175f13c538cd430f5c7bc93e7fce6432b558a6168cb85829bb9f99785bb0a3a14e0762c33d306410cbd1e1ddbb1261d702766b1924668afc011da03f7339a0f3af098ba763f36df123f757b666c9f7d6b966da82df4b5ada0b9999bea45d7c20186071fb54bfcf8f6fa0ade1b954cf0cd9b569719fccc79445cf4efd15f76f35592462030e1ac9905eda320e61835f38f1ec6cbecb34b94dec026e4f9f0e76efe85edebe790ddf9a04384c66ca920c09ca3f26ad381e56900feb171f7517d6a8d4f29f9f4375e81d89d8bcd9bab71b518ebae08cf833f5482fd32971cf482c69ec61560f274cd67cc1e521233c61efc9246d8567da45931eaca5249115d597369c58fce573de565d0ad8bb4c3685ac44d4180c8025f65e5ad74a2141dc43683846721d85915a4404771f3303828b710003761b8e13a2eb5d9022b782ef529fc3dbe43cf346b0cda9b606e5387a45069d082c42ac526bab24182c80e54545df34c0e9588b1a1f96551872beda52743b2cf51f0fdbfa31be314263dd5833391f3e4c9aa3f291a29f18d7635ceca54bd78e635cd6b79db201fc871a5554769f9ad905101281ad81b77d41eef72400b676d0ab935d7239a3b3c745098a575436c482e8f1070e01e3247c01b8659d2b96da87332ae55c337c0a879ccee0abf94e9dd7d324026c12eeef5167bc9ed2e5d169b41080669dd4f2e84327ed106c7d3876d45c2709292e93756880779626b4af1b959c2f2115e0bd7c17044ea09af35ca4187a36b1094c8219d109ae80bd503738135cf70f2894939d177db6583a572c18945c2144fd50c5b87193b64734dbd88091a4351268dbef9a34f85673509dd1061dec2bf18b69a57af7afe15af0b3a978949d670fe543723951f4b1fb0a9af625792457e23d0c6e527a033441886a951011a4a7b3c8692cae902677a2c026563f7687ef044abafba335e3eec0cc1e7e76443fdf92e1ccf85bb306dbad9b718ce68f412d8ea221f9232367f2eb33ac2343ae384272a6cad9876a3b40b57b948adc33bb952df376fd1c5951cedd523f48779fb43fd2dd90cc3ccb63d60c3dd15cb15212ef3edfaba48cec7b6453dafe7932410372d4414775238543a7870b4e8b57e0982bbe749bc8caf5ffc1185b520eae22d36ac3b93d31ca39b4331050057c911474b2f626756b006efc9ed9849c46f54d01d1992f42f3e46516c8476d1a731f1cea912a9647223c951da392b9e63a25ea25f8ac1771b7f04241c12337341be1cf16aafca13f9786a06127b57d961c0628ef3fe5f5eff7bbe2accac730eafa58ec05e1aafa8926c664a71bb01d152ce347a2ca9b66b6562fcb5274c41601fdb3373d986abd01635d7435b5b5f00fbca9dbae40f988e3e02a7587354b1e7ccb519038dc35144959f26edd883d6ab76c193f80925ccba578f99373a71353e1ca118cafc6b1805f48497eba5afa0cf4483d6cf5605168735f6bd1e605cba811b2fc1b421a70e6347be1254da934a2a219028b1b8d77f1f0964057c4e06d0199efd67146e5c6e6982c9331f6430606217f30a194eb40cb295dbe284c1d0b46cd131b41740b0ab7b2c86c64dcbcfefc0c2608ab4c1bb70b43c34930e3be4e86068a52a020e6f1e8998b88f9f0c28e736e7c3f3eb615c38134dcaef456c9521ca9bea0525a343d46bb98695fa8e40f93196b8bfd21185a76ea136bbebb1a7c4dfe1b4adf639446050c215dcfacbd6577cf7a8240ae4d7dae3f3ab5422620c050f62525ce33808df5e7366a3da9d8cdb5a38cdd0647eca4ae30e7fa18e6705863b0f6d2a12e94dd07c758beed82446331d2681e516c42b88e78bb0b405a57e67b89dad78e8a84128361a682d3d4d13967db6551346db4b14bcfbbd62c75f324c93d7e5cce104970eeff0cffa226a232ac5a117f8aa129b357b2c4e7f707f270d762e2c14390c3bafc7fb64a398c9ff809c00f542ec4485c423ce64db01c53b84d775406a0d70a8052d40eb94901fc19a094a4ad260af4a03f1a63c53d2d111283e00f80a3e1ac4c48fc353bab93204dfe539f0ba233f353704a9ffd7027e0511a162888769e4bbea1a916b879624dd45288240570c80fbbc7cd0c73af90cfe4a993a13998eb9aeead45b5eb2679ebae667d0c5e150e19766deda32907087109a8a00c78e2e7e2e73dc5074c9124969d6d90944e857bb9fb836de7140152465a652f95af5be9c70fb9e1d62f31061047f62833a675df840d06639c2c0a192fffb6232cf59a00a2d8fa95b21ab3b4a36dec3546bddd506d052667e8a0634949f624766bae2f5162aa02affc439252020f752f904fb6b3f23c3e5beb88203f484809ccbc2a9639352e80be2e0b8b6941066a6689df222e4efc70e924668e296f0db3907b25f40bc1db485bbd95cb80332743f320b1258f327775a6aa5d77c89e771b017ed07fbd3eab0638a704da2d16dc5d301ed3d4825556f264e2579c37b0d3dadcdac42667b9f8555345f674621f335315c2efefbebf2c1379f4ba31efdc0848151d6eb8494b5032064702c1fb080413143c099a0b4269c15120c5f7ab90e49b88db73a229c1cf07a4cbb6b0cec7ce29efb1d64d9957753ee4a7285551d6713e2b5e01d9f65d79f44ccdd9d5e2d6d5a33300333d86b54109e28fcb01341d072ed317e7dc722d74dc7f26d622a7bc8bd88c84cd0a7209f122cdab3c9dea488d994ff71eda3ad675ade4debf6d0178b0136f2df0885aea70ee4c945a818e8e1a43d8b347ff6baf3dfb8de8c69d205c1b57d51005d71dcf298e1d33b4adbe010a8a26c46441f94a3ee72be0e3ea17b0a8371a659d94c80980e7ec8657113de56453b146bfaadf02b83b011e2b59985161788f7a00df1b07e912b92883238584a32362a676c19c0b081848a5904d623dda5bd710cf92abaccb9ad203c73ab24c121a4b9cb2a7e5b9e402e819aa38457ff36cbf9e5c3bb1d5898c04286b4770b37161cb194ac1e88804baf4dfcd9241003cee4a89731ff37ccb679775d4d246ec8f85afabe32b207df316113f10ff97d18a97b3119d53967da0d2c3832838790211ab6e3be0a6d171b3d2f8ecec42ae324ea5cce67cfe5e47dce93a00e8c88cf12ee33064b8013b23e516a067580f24ec7a5f8a8680a86c70c5a5d42e5c1fe7268081c3733f5739c7d1d98a50d606bfbd762a2a668b284425888ad2b41113225fba64f3350bd6d9f69a4f05f801b062344fcadd8068edf9db83a16f77ac54c89604f1e3a57e1c90f64044c05ee41366acc8964413cc06040370aec2a62d68ebe948dbcab7907cd156b2f431e6edf4418ea942391f71350d4cac48e53fa5e1e9295ac04783b4b3f5aa3aecd20a9cdd66b4168724aaf90981049b7eafaf11ad7e494851fba931cc5b43bed1beaa47cfda5b0fa3c1b945ee6d8a4f4436d736cc908c6d137336c3b7155575559e7a43f6f0373bf15d44898a0e56b0a88a11423e191f706a03cec0734bd83c19b713e6cbaf629451e373924eb68c3dc7966b688c2c3c0b5d67726302c5d14d34ccba40f3cc630f1d16808da1612aea9f84c6fec04f3d46b6214940c5fec9d36d699211128be2632982e3cd56b15ae4d6e35079904e8c88287e257fc48d37c7018a2604ccb0d3fdea01f97c8bdbca846d78750ca2146126ef6ab865b54032fa9c8fa680451984105331685c5886523eaf8a99081bd9a5d25a88f8ca4047b577ad5710894e334aa1da4a4852dfcbeebcf405653e125209d7792dab7c9504892ce4244ffc83db48952f72cb3bed6916ee80d575d4fa1bec754b4074513ba8418d275de11f8c4c83f92ca1df62759caee1898e09c1c4aa61a9071aa80662020311a58847b3833e560dbaf376deb3e0074fd38f8be62db83ee8440dd69eb2bca9925f06b76b006da6d3ce7f04d5f97076a400c7f4e2ca05ee1e6d48f7375f23250de37c61099cf28de313ac9e37af0ddba31d7e426aae13aac5a38e4ae4f88a9661853e3b6fae8cc8dc12bf0ecddc3542edab2fd645ebf33155b15d4140b653ada40ebe4e7bcc5f9a9b5155e5d0a9eac8cddd40a0b9b294c3e903984d3f265f10a144979c597a502970bfdaf1e6b42bcb56e714f37551d4484c858fb864f3c61c238d52f97894cf1aa01b9cf9a180987527ef9a51b8d86d14146fd703381d341c1b1067b37a2678b53eae6ab1b95e78448a725703c308a5974430a05683582fd78bb3841ad73878b0f8dda213b18776ad81c15499e521cc86a7f95425333a079ee8fe8dc75bb078b7d2a9fd53c4fc4cfbfdc9363d73fb8ccaba56f532cbfb5ee5dc428b1bebe2f131ef6ba1c28135b5e3dd87f4ceaf22bc62f7e6d27d11737749e56a21551e1a00a80cb91720899b74c86e07f0a6c78bea98164385120193bd7287aa5570da025ef24e7c41eaf2a1e13e3d28c5ad0ecaf9a640cc9a96bbdf63be36276f61c34594f7fd7bf755a3f08133e78495112ca7f6d841eed55ab673fbe2ccd10d29c02625d2224e7efc4430ce4a799bf25f9b9d05f60a0ac3f2aef1c39311b7861a96c26c7d7755d8236bbe6f72bb95b96fdf53dc5b0fc7a724f1f103fff1e192e041f65347719e88f3265f36eccb9118c23d2932502a26792ea8b6009391b611411dc06a61a61ab490129c40e62fbe7452b167acedf3232e4e8f6d3dda234bba45b9c08f85f75c2667b858aa307f5a5c5cd09654aa38fa13b8349348c78955dfa841ed78ba2deb6db120f18ab71d64e60772c648f8fc0a8fa5e34645071764bf5ba72522be6685486b1b720a61835faf483adff06d6f8773893a15c6ff11b989df4a0148ecb9fd6ac245b9ab16cba479ca1fd6e05aab8bb6dc5e2e96e2c925c004cfa960d2eaf0eda336fbb6d99dfca75315b3578b838f8fcfb297de625927ea7e1beb27a1475ff0a4ac89ca816052584fdd2b9655810fa30759cacf10b7532212da2f7d4d0aeab98de92dbc5ad716e50832263e9fdd0146edf6fc6b5a6a1e8a9156fc43e27bb7102abf412b38832c07ca297ad48ec17d2dfcad46b85c069771ee893a2ceb9c5dd4d7acf7b1c85c7a5f7d4e6f57c3c697b2b9cfd82035e3f375238559474d77eb0dc53fab30ca88edefc4da1e6410b38210a0eb289063b5ab3c41c7fb7e2ba2e96e54a2203232d04da2335733ffed156bb804666a67e6a41e6b9b2b3c11dfd90159f4cefff99487167828f1f67440d39c6a7c45bd038070ecf987d4108eed13b2ac3077c2f704fab9cc8780aa4187167012ef36e47e4e83e37d816564b5a5f7d56a727193d61b8b1ed4f9391591786dd1f6ac841037f0b8cfc42b85622383c178654707dafeb6955c745ebad0f7cf2be0356ff1d500893be440b53e67f850ee5c0d9b2eb546d4f66c6e163e6cf24dfd4fb9bf1c72d43ce00946ae8c95f85be499a099ab1cb973f1bff7513255952ca34382d6d8a0f7b3a9ff6a9163a1a6d9625f9ae908f6c4fbc70cb5a24cc7a97173e119b68b403ed2809a3f0d8534700a3b7812233d3c0ec02229fdedb974e9614ec137edc1d00a558e8a935bf3d6b9e7393bc3706d00aad731006b4c218fd65ac9ecc98e8807b782fa56ceca066ab0922c315d9b7dc07420f566f47c4e2d097af7a3688f76bcda0e69ba1563bcb368a80c6edb2e514145f1ae233ba86155c2152d7b5ea4984882e7d514fe1efa81f25b75c8943c662f2703a53299d3f275ccdf0f8844b3659ecdb7dc655144082bb3e2c009837c6bb8be9e85d337566885f38be06e1bb0230d17900ce0da8a01560e39adede46648d704449f4"}) write$rfkill(r0, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}, 0x8) 15:26:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 13) [ 3181.932643] [ 3181.933021] ====================================================== [ 3181.934303] WARNING: possible circular locking dependency detected [ 3181.935574] 5.10.201 #1 Not tainted [ 3181.936451] ------------------------------------------------------ [ 3181.937940] syz-executor.0/17722 is trying to acquire lock: 15:26:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0xfff}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) write(r0, &(0x7f0000000380)="02", 0x1) (fail_nth: 17) [ 3181.939302] ffff88801a728ae8 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}, at: __flush_work+0xdd/0xa90 [ 3181.941712] [ 3181.941712] but task is already holding lock: [ 3181.943122] ffff88801a728f40 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0xef/0x1240 [ 3181.945161] [ 3181.945161] which lock already depends on the new lock. [ 3181.945161] [ 3181.950536] [ 3181.950536] the existing dependency chain (in reverse order) is: [ 3181.952080] [ 3181.952080] -> #3 (&hdev->req_lock){+.+.}-{3:3}: [ 3181.953336] __mutex_lock+0x13d/0x10b0 [ 3181.954221] hci_dev_do_close+0xef/0x1240 [ 3181.955144] hci_rfkill_set_block+0x166/0x1a0 [ 3181.956137] rfkill_set_block+0x1fd/0x540 [ 3181.957060] rfkill_fop_write+0x253/0x4b0 [ 3181.957988] vfs_write+0x29a/0xa70 15:26:27 executing program 6: r0 = syz_open_pts(0xffffffffffffffff, 0xc880) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x4c, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x3a}, @val={0x8, 0x3, r2}, @val={0xc}}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_team\x00'}]}, 0x4c}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="440200002e00000129bd7000fbdbdf250b000000ed001c8008003500", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="04002200ce2cd105ddde52b442daa0bea0d9db60c9cf8f3dbff4b0fb5178272b43072a8a581a21ffaac16b94434c6f88a60a7f5db97312df87bb90baab3c6dbc908ca80239af7c48cb3b90262888e9cff92d2ab53bdc5673000000"], 0x244}, 0x1, 0x0, 0x0, 0x4000}, 0x810) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x4e21, 0x6, @mcast2, 0xdc6}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendmsg$inet6(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="29719ea84f4503ceb5fcf5ea0549f4ae77ab00abd023edee71c45435000086c5813ebf7039", 0x25}], 0x1}, 0x10044001) r6 = fork() setsockopt$inet6_tcp_int(r5, 0x6, 0x19, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r6, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000040)=r6) sendmsg$nl_generic(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001e00210c00000000000000000002000008000000", @ANYRES32=r6, @ANYBLOB="284a506bfba37636a281bb167ad6398a06b7e942bba0b2a5889cfe88ef37b78c58b3cab46ef032d1bb6b119a3a0a3c9035dd01c964a523"], 0x1c}}, 0x0) fcntl$setown(r0, 0x8, r6) [ 3181.958820] ksys_write+0x1f6/0x260 [ 3181.959777] do_syscall_64+0x33/0x40 [ 3181.960619] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3181.961722] [ 3181.961722] -> #2 (rfkill_global_mutex){+.+.}-{3:3}: [ 3181.963052] __mutex_lock+0x13d/0x10b0 15:26:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x200000d4) pread64(r0, &(0x7f00000001c0)=""/4107, 0x7b, 0x0) r1 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x6, 0x5, &(0x7f00000016c0)=[{&(0x7f0000001240)="9af5dfe0235ea465b84f7548255c", 0xe}, {&(0x7f0000001280)="5fa3303b9a803364f7412e6b82791b5d84177b5f465b136e48dcd4d427420b8b4f4132307439babe42c9e611755a4b4af1215266f6007b93aaa439d76ad9c6e0fb66930e78979cd03953128057b9ad", 0x4f, 0x2}, {&(0x7f0000001500)="2b6e8eb0d902cde0633cef07ad11b6777947986100245af3b47131644ab0d65a8f821c481645a0e25f19b4cf63073f984b25c95ffe8cfa7b96b09fb770fb101f36eb5441883de9f11228e8800965eca7558d397fcba78a537838594d5804b94455ff8849f72b9907d8e26eca1910f87297d384f60f222d6ad42d0bf618df0e08877a24e680f0b310543319739e7bc292a4dbbc4ff46810c7bdb23219a8c2e0ede38d885b9d3af495b3846128e9947877e6b3184564c53bb7dcf3fcf7691ea170283cedb56702530f25864a8d28ef49903a7b9ef80a6e1c974ff3b57dee43581d265b1074a3", 0xe5, 0x20}, {&(0x7f0000001600)="729092ddb06293791e1e1da50e7bc78f5e58c7e7d7415b9ddd7b9d5d78641f9874026a5fee2ea5b79e245db0fd78fc46226e68e90602f69e9a191d6fa4b55c9d31ebd4a85485cdca6ee83242230ee041996e6c", 0x53, 0xfffffffffffffbff}, {&(0x7f0000001680)="4d653d37cefad854e75b737675adb15dd2151f07ea1efdc09fc0feb92e0bb71b2ae111e7d5aa35b81bac336f818d32f1abc4406d9d448e5ea832ab35e5b8cc", 0x3f, 0x1000}], 0x208400, &(0x7f0000001740)={[{@dmode={'dmode', 0x3d, 0x5}}, {@nocompress}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/sr0\x00'}}, {@appraise_type}, {@smackfshat}, {@dont_hash}, {@context={'context', 0x3d, 'sysadm_u'}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001800)=ANY=[@ANYBLOB="00000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff030000faffffff0900000000000000080000000000000005000000000000000100000000000000000000000000000000000000000000000000000000000000d30800002ac000000700000000000000020000000000000001000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00"/376]) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x127c, &(0x7f0000000000)) r3 = memfd_create(&(0x7f0000000340)='\x00', 0x2) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004af00)={0x4, [], 0x0, "e6a2e51d013042"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000100)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 3181.964043] rfkill_register+0x36/0xa10 [ 3181.965001] hci_register_dev+0x42e/0xc00 [ 3181.965958] __vhci_create_device+0x2c8/0x5c0 [ 3181.966997] vhci_open_timeout+0x38/0x50 [ 3181.967923] process_one_work+0x9a9/0x14b0 [ 3181.968876] worker_thread+0x61d/0x1310 [ 3181.969790] kthread+0x38f/0x470 [ 3181.970593] ret_from_fork+0x22/0x30 [ 3181.971449] [ 3181.971449] -> #1 (&data->open_mutex){+.+.}-{3:3}: [ 3181.972782] __mutex_lock+0x13d/0x10b0 [ 3181.973692] vhci_send_frame+0x63/0xa0 [ 3181.974648] hci_send_frame+0x1b9/0x320 [ 3181.975542] hci_tx_work+0x10af/0x1660 [ 3181.976418] process_one_work+0x9a9/0x14b0 [ 3181.977359] worker_thread+0x61d/0x1310 [ 3181.978264] kthread+0x38f/0x470 [ 3181.979035] ret_from_fork+0x22/0x30 [ 3181.979871] [ 3181.979871] -> #0 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}: [ 3181.981435] __lock_acquire+0x29e7/0x5b00 [ 3181.982374] lock_acquire+0x197/0x470 [ 3181.983232] __flush_work+0x105/0xa90 [ 3181.984089] hci_dev_do_close+0x131/0x1240 [ 3181.985024] hci_rfkill_set_block+0x166/0x1a0 [ 3181.986016] rfkill_set_block+0x1fd/0x540 [ 3181.986947] rfkill_fop_write+0x253/0x4b0 [ 3181.987865] vfs_write+0x29a/0xa70 [ 3181.988687] ksys_write+0x1f6/0x260 [ 3181.989514] do_syscall_64+0x33/0x40 [ 3181.990375] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3181.991492] [ 3181.991492] other info that might help us debug this: [ 3181.991492] [ 3181.993099] Chain exists of: [ 3181.993099] (work_completion)(&hdev->tx_work) --> rfkill_global_mutex --> &hdev->req_lock [ 3181.993099] [ 3181.995640] Possible unsafe locking scenario: [ 3181.995640] [ 3181.996843] CPU0 CPU1 [ 3181.997734] ---- ---- [ 3181.998638] lock(&hdev->req_lock); [ 3181.999375] lock(rfkill_global_mutex); [ 3182.000652] lock(&hdev->req_lock); [ 3182.001859] lock((work_completion)(&hdev->tx_work)); [ 3182.002909] [ 3182.002909] *** DEADLOCK *** [ 3182.002909] [ 3182.004152] 2 locks held by syz-executor.0/17722: [ 3182.005108] #0: ffffffff85619468 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 3182.006985] #1: ffff88801a728f40 (&hdev->req_lock){+.+.}-{3:3}, at: hci_dev_do_close+0xef/0x1240 [ 3182.008789] [ 3182.008789] stack backtrace: [ 3182.009693] CPU: 1 PID: 17722 Comm: syz-executor.0 Not tainted 5.10.201 #1 [ 3182.011093] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3182.012745] Call Trace: [ 3182.013270] dump_stack+0x107/0x167 [ 3182.013998] check_noncircular+0x263/0x2e0 [ 3182.014856] ? register_lock_class+0xbb/0x17b0 [ 3182.015765] ? print_circular_bug+0x470/0x470 [ 3182.016658] ? stack_trace_consume_entry+0x160/0x160 [ 3182.017673] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 3182.018575] __lock_acquire+0x29e7/0x5b00 [ 3182.019410] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 3182.020455] ? rwlock_bug.part.0+0x90/0x90 [ 3182.021306] lock_acquire+0x197/0x470 [ 3182.022067] ? __flush_work+0xdd/0xa90 [ 3182.022861] ? lock_release+0x680/0x680 [ 3182.023654] ? lock_release+0x680/0x680 [ 3182.024445] ? lock_chain_count+0x20/0x20 [ 3182.025270] ? perf_trace_lock+0xac/0x490 [ 3182.026095] ? lock_chain_count+0x20/0x20 [ 3182.026932] __flush_work+0x105/0xa90 [ 3182.027687] ? __flush_work+0xdd/0xa90 [ 3182.028463] ? queue_delayed_work_on+0xe0/0xe0 [ 3182.029370] ? hci_dev_do_close+0xef/0x1240 [ 3182.030238] ? __cancel_work_timer+0x2a9/0x4c0 [ 3182.031148] ? mutex_lock_io_nested+0xf30/0xf30 [ 3182.032077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3182.033122] ? cancel_delayed_work+0x24d/0x2b0 [ 3182.034029] ? trace_hardirqs_on+0x5b/0x180 [ 3182.034905] ? cancel_delayed_work+0x1b8/0x2b0 [ 3182.035819] ? cancel_delayed_work_sync+0x20/0x20 [ 3182.036783] hci_dev_do_close+0x131/0x1240 [ 3182.037625] ? rfkill_set_block+0x18f/0x540 [ 3182.038495] ? hci_dev_open+0x350/0x350 [ 3182.039286] ? mark_held_locks+0x9e/0xe0 [ 3182.040090] hci_rfkill_set_block+0x166/0x1a0 [ 3182.040973] ? hci_power_off+0x20/0x20 [ 3182.041736] rfkill_set_block+0x1fd/0x540 [ 3182.042574] rfkill_fop_write+0x253/0x4b0 [ 3182.043394] ? rfkill_sync_work+0xa0/0xa0 [ 3182.044218] ? security_file_permission+0x24e/0x570 [ 3182.045203] ? rfkill_sync_work+0xa0/0xa0 [ 3182.046023] vfs_write+0x29a/0xa70 [ 3182.046733] ksys_write+0x1f6/0x260 [ 3182.047452] ? __ia32_sys_read+0xb0/0xb0 [ 3182.048255] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 3182.049294] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3182.050343] do_syscall_64+0x33/0x40 [ 3182.051080] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3182.052082] RIP: 0033:0x7f93ac9aab19 [ 3182.052811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3182.056401] RSP: 002b:00007f93a9f20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3182.057885] RAX: ffffffffffffffda RBX: 00007f93acabdf60 RCX: 00007f93ac9aab19 [ 3182.059337] RDX: 0000000000000008 RSI: 00000000200000c0 RDI: 0000000000000003 [ 3182.060744] RBP: 00007f93aca04f6d R08: 0000000000000000 R09: 0000000000000000 [ 3182.062168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 3182.063577] R13: 00007ffc275ed43f R14: 00007f93a9f20300 R15: 0000000000022000 [ 3182.164230] attempt to access beyond end of device [ 3182.164230] loop3: rw=2049, want=21, limit=15 [ 3182.166305] FAULT_INJECTION: forcing a failure. [ 3182.166305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3182.168659] CPU: 0 PID: 17736 Comm: syz-executor.3 Not tainted 5.10.201 #1 [ 3182.170042] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3182.171723] Call Trace: [ 3182.172261] dump_stack+0x107/0x167 [ 3182.172999] should_fail.cold+0x5/0xa [ 3182.173772] _copy_to_user+0x2e/0x180 [ 3182.174558] simple_read_from_buffer+0xcc/0x160 [ 3182.175497] proc_fail_nth_read+0x198/0x230 [ 3182.176365] ? proc_sessionid_read+0x230/0x230 [ 3182.177239] FAULT_INJECTION: forcing a failure. [ 3182.177239] name failslab, interval 1, probability 0, space 0, times 0 [ 3182.177285] ? security_file_permission+0x24e/0x570 [ 3182.177311] ? perf_trace_initcall_start+0x101/0x380 [ 3182.181439] ? proc_sessionid_read+0x230/0x230 [ 3182.182371] vfs_read+0x228/0x580 [ 3182.183076] ksys_read+0x12d/0x260 [ 3182.183792] ? vfs_write+0xa70/0xa70 [ 3182.184554] ? switch_fpu_return+0x131/0x290 [ 3182.185440] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3182.186495] do_syscall_64+0x33/0x40 [ 3182.187250] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3182.188285] RIP: 0033:0x7fd0ff16369c [ 3182.189057] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 3182.192816] RSP: 002b:00007fd0fc726170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3182.194360] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fd0ff16369c [ 3182.195800] RDX: 000000000000000f RSI: 00007fd0fc7261e0 RDI: 0000000000000004 [ 3182.197241] RBP: 00007fd0fc7261d0 R08: 0000000000000000 R09: 0000000000000000 [ 3182.198684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3182.200125] R13: 00007ffe26656eef R14: 00007fd0fc726300 R15: 0000000000022000 [ 3182.201584] CPU: 1 PID: 17739 Comm: syz-executor.4 Not tainted 5.10.201 #1 [ 3182.202912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3182.204462] Call Trace: [ 3182.204957] dump_stack+0x107/0x167 [ 3182.205639] should_fail.cold+0x5/0xa [ 3182.206360] ? mempool_alloc+0x148/0x360 [ 3182.207116] ? mempool_free_pages+0x20/0x20 [ 3182.207922] should_failslab+0x5/0x20 [ 3182.208634] kmem_cache_alloc+0x5b/0x310 [ 3182.209395] ? mempool_free_pages+0x20/0x20 [ 3182.210208] mempool_alloc+0x148/0x360 [ 3182.210941] ? _raw_spin_unlock+0x1a/0x30 [ 3182.211715] ? mempool_resize+0x7d0/0x7d0 [ 3182.212487] ? __brelse+0x84/0xa0 [ 3182.213136] ? perf_trace_lock+0xac/0x490 [ 3182.213918] bio_alloc_bioset+0x36e/0x600 [ 3182.214715] ? __lockdep_reset_lock+0x180/0x180 [ 3182.215574] ? bvec_alloc+0x2f0/0x2f0 [ 3182.216278] ? perf_trace_lock+0xac/0x490 [ 3182.217056] ? __mark_inode_dirty+0x312/0xd40 [ 3182.217912] mpage_alloc+0x2f/0x260 [ 3182.218629] __mpage_writepage+0x114e/0x1670 [ 3182.219446] ? clean_buffers+0x2a0/0x2a0 [ 3182.220202] ? page_mapped+0x18b/0x350 [ 3182.220922] ? find_get_pages_range_tag+0x5c9/0xbf0 [ 3182.221842] ? page_mkclean+0x151/0x2c0 [ 3182.222595] ? invalid_page_referenced_vma+0x570/0x570 [ 3182.223555] ? find_get_pages_contig+0x9c0/0x9c0 [ 3182.224427] ? tag_pages_for_writeback+0x32f/0x450 [ 3182.225335] ? __page_set_anon_rmap+0x2b0/0x2b0 [ 3182.226203] ? __mod_memcg_lruvec_state+0x4e/0x2f0 [ 3182.227106] ? percpu_counter_add_batch+0x8b/0x140 [ 3182.228016] ? clear_page_dirty_for_io+0x216/0x7c0 [ 3182.228925] write_cache_pages+0x57f/0xe50 [ 3182.229706] ? clean_buffers+0x2a0/0x2a0 [ 3182.230485] ? clear_page_dirty_for_io+0x7c0/0x7c0 [ 3182.231385] ? create_page_buffers+0x139/0x230 [ 3182.232231] ? perf_trace_lock+0xac/0x490 [ 3182.233019] ? perf_trace_lock+0xac/0x490 [ 3182.233788] ? __block_write_begin_int+0x13fd/0x19c0 [ 3182.234752] ? __lockdep_reset_lock+0x180/0x180 [ 3182.235613] ? xas_set_mark+0x282/0x2f0 [ 3182.236357] ? fat_add_cluster+0x100/0x100 [ 3182.237163] ? fat_readahead+0x20/0x20 [ 3182.237898] mpage_writepages+0xd8/0x230 [ 3182.238697] ? mpage_end_io+0x2c0/0x2c0 [ 3182.239437] ? lock_downgrade+0x6d0/0x6d0 [ 3182.240198] ? fat_add_cluster+0x100/0x100 [ 3182.240980] ? mark_buffer_dirty+0x346/0x3d0 [ 3182.241784] do_writepages+0xee/0x2a0 [ 3182.242493] ? page_writeback_cpu_online+0x20/0x20 [ 3182.243391] ? iov_iter_advance+0x23b/0xec0 [ 3182.244206] ? fat_write_end+0x6b/0x220 [ 3182.244937] ? fat_write_end+0xd2/0x220 [ 3182.245708] __filemap_fdatawrite_range+0x24b/0x2f0 [ 3182.246628] ? delete_from_page_cache_batch+0xa30/0xa30 [ 3182.247600] ? page_cache_prev_miss+0x310/0x310 [ 3182.248457] filemap_write_and_wait_range+0x65/0x100 [ 3182.249381] __generic_file_write_iter+0x303/0x5d0 [ 3182.250291] generic_file_write_iter+0xdb/0x230 [ 3182.251133] ? iov_iter_init+0x3c/0x130 [ 3182.251863] new_sync_write+0x42c/0x660 [ 3182.252586] ? lock_release+0x4d1/0x680 [ 3182.253308] ? new_sync_read+0x6f0/0x6f0 [ 3182.254048] ? __fdget_pos+0xf1/0x190 [ 3182.254754] ? lock_release+0x680/0x680 [ 3182.255476] ? selinux_file_permission+0x92/0x520 [ 3182.256357] ? __fget_files+0x296/0x4c0 [ 3182.257079] vfs_write+0x747/0xa70 [ 3182.257779] ksys_write+0x12d/0x260 [ 3182.258485] ? __ia32_sys_read+0xb0/0xb0 [ 3182.259234] ? fpregs_assert_state_consistent+0xb9/0xe0 [ 3182.260215] ? syscall_enter_from_user_mode+0x1d/0x50 [ 3182.261159] do_syscall_64+0x33/0x40 [ 3182.261856] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 3182.262790] RIP: 0033:0x7f7ec0254b19 [ 3182.263469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3182.266873] RSP: 002b:00007f7ebd7ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3182.268255] RAX: ffffffffffffffda RBX: 00007f7ec0367f60 RCX: 00007f7ec0254b19 [ 3182.269550] RDX: 0000000000000001 RSI: 0000000020000380 RDI: 0000000000000003 [ 3182.270858] RBP: 00007f7ebd7ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 3182.272144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3182.273447] R13: 00007ffe3db9302f R14: 00007f7ebd7ca300 R15: 0000000000022000 [ 3182.280017] attempt to access beyond end of device [ 3182.280017] loop4: rw=2049, want=21, limit=15 VM DIAGNOSIS: 15:26:27 Registers: info registers vcpu 0 RAX=0000000000000000 RBX=00000000000004b6 RCX=00007fbc6bc1b487 RDX=0000000000000000 RSI=0000000000000000 RDI=00007ffdb0e7ebe0 RBP=00007ffdb0e7db20 RSP=00007ffdb0e7eb30 R8 =0000000000000000 R9 =00007ffdb0e7d8f0 R10=0000555556c9acdb R11=0000000000000207 R12=00007fbc6bc75105 R13=00007ffdb0e7ebe0 R14=0000555556c9ac20 R15=00007ffdb0e7ec20 RIP=00007fbc6bbbb157 RFL=00000206 [-----P-] CPL=3 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0033 0000000000000000 ffffffff 00a0fb00 DPL=3 CS64 [-RA] SS =002b 0000000000000000 ffffffff 00c0f300 DPL=3 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000555556c99400 00000000 00000000 GS =0000 0000000000000000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555556ca2c58 CR3=00000000463d0000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0000000000000000ff000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=dffffc0000000060 RBX=00000000000003fd RCX=0000000000000000 RDX=00000000000003fd RSI=ffffffff822ca00c RDI=ffffffff879e81e0 RBP=ffffffff879e81a0 RSP=ffff88804c66f290 R8 =0000000000000001 R9 =0000000000000003 R10=000000000000000a R11=0000000000000001 R12=0000000000000020 R13=fffffbfff0f3d088 R14=fffffbfff0f3d03e R15=dffffc0000000000 RIP=ffffffff822ca060 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f93a9f20700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555555906c58 CR3=000000004b9aa000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000