[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 122.941611][ T32] kauditd_printk_skb: 4 callbacks suppressed [ 122.941661][ T32] audit: type=1800 audit(1584016108.982:39): pid=11803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 122.976671][ T32] audit: type=1800 audit(1584016109.022:40): pid=11803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 [ 123.707097][ T32] audit: type=1400 audit(1584016109.752:41): avc: denied { map } for pid=11972 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.43' (ECDSA) to the list of known hosts. 2020/03/12 12:28:42 fuzzer started syzkaller login: [ 136.381748][ T32] audit: type=1400 audit(1584016122.422:42): avc: denied { map } for pid=11986 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2020/03/12 12:28:47 dialing manager at 10.128.0.26:41683 2020/03/12 12:28:47 syscalls: 2967 2020/03/12 12:28:47 code coverage: enabled 2020/03/12 12:28:47 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2020/03/12 12:28:47 extra coverage: enabled 2020/03/12 12:28:47 setuid sandbox: enabled 2020/03/12 12:28:47 namespace sandbox: enabled 2020/03/12 12:28:47 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/12 12:28:47 fault injection: enabled 2020/03/12 12:28:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/12 12:28:47 net packet injection: enabled 2020/03/12 12:28:47 net device setup: enabled 2020/03/12 12:28:47 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/12 12:28:47 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 141.841811][ T32] audit: type=1400 audit(1584016127.882:43): avc: denied { integrity } for pid=12001 comm="syz-executor" lockdown_reason="debugfs access" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 12:31:36 executing program 0: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000300)={0xb, {'syz1\x00', 'syz1\x00', 'syz1\x00', 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, "fa4a5ee5cf1bb1320bd1"}}, 0x122) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}]}}}]}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x8000) [ 310.789867][ T32] audit: type=1400 audit(1584016296.832:44): avc: denied { map } for pid=12003 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=17422 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 311.293765][T12004] IPVS: ftp: loaded support on port[0] = 21 [ 311.502494][T12004] chnl_net:caif_netlink_parms(): no params data found [ 311.659311][T12004] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.667074][T12004] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.676527][T12004] device bridge_slave_0 entered promiscuous mode [ 311.692306][T12004] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.699586][T12004] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.708960][T12004] device bridge_slave_1 entered promiscuous mode [ 311.759326][T12004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.778816][T12004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.826985][T12004] team0: Port device team_slave_0 added [ 311.841451][T12004] team0: Port device team_slave_1 added [ 311.886369][T12004] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 311.893539][T12004] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.919768][T12004] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 311.937678][T12004] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 311.945036][T12004] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.971248][T12004] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 312.160711][T12004] device hsr_slave_0 entered promiscuous mode [ 312.284159][T12004] device hsr_slave_1 entered promiscuous mode [ 312.796466][ T32] audit: type=1400 audit(1584016298.842:45): avc: denied { create } for pid=12004 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 312.802263][T12004] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 312.821497][ T32] audit: type=1400 audit(1584016298.842:46): avc: denied { write } for pid=12004 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 312.853052][ T32] audit: type=1400 audit(1584016298.842:47): avc: denied { read } for pid=12004 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 312.902406][T12004] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 313.074756][T12004] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 313.333419][T12004] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 313.821153][T12004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.859236][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.868251][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.892025][T12004] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.916570][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 313.927629][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.937106][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.944359][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.995240][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 314.004920][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.015160][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.024560][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.031744][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.040766][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 314.051780][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 314.089635][ T3914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 314.099077][ T3914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 314.133874][ T3914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 314.142897][ T3914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 314.152182][ T3914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 314.191135][T12004] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 314.202251][T12004] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 314.215935][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 314.225887][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.235463][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.244349][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.284413][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.308929][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.317200][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.354738][T12004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.423935][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 314.433931][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 314.495647][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 314.505178][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 314.529861][T12004] device veth0_vlan entered promiscuous mode [ 314.539465][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 314.548911][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 314.587025][T12004] device veth1_vlan entered promiscuous mode [ 314.633449][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 314.643457][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 314.684989][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 314.695111][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 314.716852][T12004] device veth0_macvtap entered promiscuous mode [ 314.740580][T12004] device veth1_macvtap entered promiscuous mode [ 314.795598][T12004] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 314.804779][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 314.814321][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 314.823674][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 314.833627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 314.861255][T12004] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 314.870937][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 314.880967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 315.322829][ T32] audit: type=1400 audit(1584016301.342:48): avc: denied { associate } for pid=12004 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 315.525948][ T32] audit: type=1400 audit(1584016301.572:49): avc: denied { open } for pid=12029 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 315.549869][ T32] audit: type=1400 audit(1584016301.572:50): avc: denied { kernel } for pid=12029 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=perf_event permissive=1 [ 315.573916][ T32] audit: type=1400 audit(1584016301.572:51): avc: denied { confidentiality } for pid=12029 comm="syz-executor.0" lockdown_reason="unsafe use of perf" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=lockdown permissive=1 [ 315.625230][T12031] device sit1 entered promiscuous mode [ 315.712686][ C1] hrtimer: interrupt took 116030 ns 12:31:41 executing program 0: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000180), 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000300)={0xb, {'syz1\x00', 'syz1\x00', 'syz1\x00', 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, "fa4a5ee5cf1bb1320bd1"}}, 0x122) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}]}}}]}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x8000) [ 316.022995][T12035] device sit2 entered promiscuous mode 12:31:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f16000040b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 12:31:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)='\b\x00\x00\x00\x00\x00\x00\x00', 0x8) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$packet(r3, 0x0, 0x0, 0x0) sendmmsg(r4, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000440)="bf", 0x1}, {&(0x7f0000000500)="31f36959eace979514f59f41f14a615ff0e4873090aa856776a92e8f738b8a485d2667b24830753ecb00b4190f3aaf67ae66a2c1c5e525129da25aa69e133b0f5f7a8690e66f3ede2d8590900428564311955e8afe5bda57d71450ae50a7b77fba72272780101ef5d61e93c10400b833026e90a9ba8d80a5e2b9eb", 0x7b}, {&(0x7f00000005c0)="23c00604575bf9ee1465515de8c52884136333ddbbb0028dfed4f1805019b7bdc377a659c5d26c2f1fe93ae596700b4fe1326a31c016564329d3cc322fda27a5bc54b73f5962e83bc776a74e96ec843b68684709a5fcdb9f8e0723a4b4", 0x5d}], 0x3}}], 0x1, 0x0) 12:31:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(r2, 0x0, 0x0, 0x110001) fallocate(r1, 0x0, 0x0, 0x110001) [ 317.043216][T12048] IPVS: ftp: loaded support on port[0] = 21 12:31:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000000706010800000000000000000000000005000100060000009d06c5e6ca1787384287eb5dc0cfd94b756601b0565066345a2f0b10873d1aedd691b04dde9d0ec86718f0f1c68a534f89449fc1b80d69f749fa26e776854a57c3d13064a208fe171a6a8caca6a0c7903f023740fcb6795631054252aba21b0032e670a3a410ac9bb27ea2e30540f18b6fd29d9b02304afd3335287c3aa6c343a290a9e670900e8f3a9223eb145d9b5f933a5f0c6f6eb8eb0f6f0df7af208aca43afee0b89d8c81dcd6eb61ad49dd6ed523b7e1495a547eddffde4a08dee84a84b430532"], 0x1c}}, 0x0) [ 317.434295][T12048] chnl_net:caif_netlink_parms(): no params data found [ 317.608143][T12048] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.615589][T12048] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.625706][T12048] device bridge_slave_0 entered promiscuous mode [ 317.644340][ T32] audit: type=1400 audit(1584016303.692:52): avc: denied { create } for pid=12062 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 317.697967][T12048] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.705886][T12048] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.715257][T12048] device bridge_slave_1 entered promiscuous mode [ 317.722743][ T32] audit: type=1400 audit(1584016303.722:53): avc: denied { write } for pid=12062 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 12:31:43 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 317.761920][T12048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 317.780879][T12048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.834923][T12048] team0: Port device team_slave_0 added [ 317.861658][T12048] team0: Port device team_slave_1 added [ 317.954735][T12066] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 317.965764][T12048] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 317.973151][T12048] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 317.999211][T12048] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 12:31:44 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 318.099794][T12048] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 318.107503][T12048] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 318.133796][T12048] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 318.146698][ T929] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 318.250249][T12048] device hsr_slave_0 entered promiscuous mode [ 318.295474][T12048] device hsr_slave_1 entered promiscuous mode [ 318.334134][T12048] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 318.341772][T12048] Cannot create hsr debugfs directory [ 318.400456][T12074] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:44 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 318.502155][ T405] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:44 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 318.664348][T12079] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 318.779161][ T288] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 318.876051][T12048] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 318.956260][T12048] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 318.966781][T12084] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 319.017296][T12048] netdevsim netdevsim1 netdevsim2: renamed from eth2 12:31:45 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x2800) [ 319.066499][T12048] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 319.075335][ T405] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 319.253979][T12090] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:45 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x2800) [ 319.341046][ T405] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:45 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) getdents(0xffffffffffffffff, &(0x7f0000077000)=""/133, 0x2800) [ 319.439266][T12094] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 319.499297][ T929] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 319.648690][T12098] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 319.682452][T12048] 8021q: adding VLAN 0 to HW filter on device bond0 12:31:45 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 319.748541][ T405] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 319.783305][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.792256][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.816188][T12048] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.908648][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.918257][T12103] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 319.918617][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.936802][ T30] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.944099][ T30] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.063447][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 320.072490][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 320.082767][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.091962][ T30] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.099248][ T30] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.108337][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 320.119118][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 320.231884][T12048] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 320.242561][T12048] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.287221][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 320.297769][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.308282][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 320.318661][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.329132][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 320.338678][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.348863][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.358420][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.454007][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.463239][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.471448][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 320.479314][ T30] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 320.500999][T12048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 320.569410][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 320.579312][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 320.629626][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 320.639154][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.662475][T12048] device veth0_vlan entered promiscuous mode [ 320.676357][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.685668][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 320.726412][T12048] device veth1_vlan entered promiscuous mode [ 320.813196][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 320.824257][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 320.833739][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 320.843625][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 320.868720][T12048] device veth0_macvtap entered promiscuous mode [ 320.891050][T12048] device veth1_macvtap entered promiscuous mode [ 320.957220][T12048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 320.968947][T12048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 320.982675][T12048] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 320.990414][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 320.999897][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 321.009851][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 321.019690][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 321.042287][T12048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 321.053616][T12048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 321.067019][T12048] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 321.078233][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 321.088565][T12111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 12:31:48 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 12:31:48 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 322.067676][T12136] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:48 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 322.176808][T12141] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:48 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 322.335186][T12145] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 322.345892][ T895] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:48 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) [ 322.587692][T12150] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 322.615733][T12154] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:48 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 322.704337][ T929] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:48 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) [ 322.938725][T12159] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 322.973591][T12165] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:49 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) 12:31:49 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) [ 323.436967][T12174] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 323.466154][T12175] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:49 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) 12:31:49 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) [ 323.989746][T12183] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:50 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) [ 324.110500][T12189] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:50 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) [ 324.477075][T12195] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:50 executing program 1: r0 = gettid() tkill(r0, 0x3c) pidfd_open(r0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/raw\x00') ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000080)) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1, 0x8000) open_by_handle_at(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x50000) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="290000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000300012800c0001006d6163766c616e00200002800a000470f60000aaaaaa0000080003000100000008000100100000000a0005000400000000000000"], 0x3}}, 0x4000000) [ 324.694502][T12201] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:50 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) 12:31:51 executing program 1: ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000004c0)={r0, 0x1}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894", 0x53}], 0x0, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x40, 0x3, &(0x7f0000000400)=[{&(0x7f0000000440)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x3f2}, {&(0x7f0000000200)="77b9d4708800a87cbfffa147485460f16a7e3f00dfb372be49adfe3d72c62ca4162405bdb35c9e1cce7d3021035b396771325efb4bcb61af94ebd58477b1ec2357bde5da794229c1338b6c7434556871d5dfc0866c38236d42df13b1e7216c3b4edc8a9d4b4f010ecabbec81fb7109ea2c5c115eda36bfa8e7af709a3e48fa55b4d2708a579b965d97c71967f327101717b1d5da7f3d1ce52fb8bd7583e8559c2400290a262d8311468e33481507d3cdf1c690c605af7f0a3e8117e21fc5587773ccd303f659057b88c695158af27377e50d170445d7aa9c5046", 0xda, 0x5}, {&(0x7f0000000300)="bd4510fa5da20961976f46de517382198985cc70f21428104708e6706c46807f6699cf911808e7c298bda900c9ceb86c5a88c6694c71293c4d9ff7db9fce6cf0fdf5995c7f4dde969f3c9477d376a059359d7a96245ac526ba86345da1af4da79d121e728d663b884e8cc218a18df1628d6bb46af9d950aedf6b15b4401b5259d7f6f361bfcbb64fb7826da9025ff714755a34019d8bd6d59745a8ff8aa9729cb2d07bbc391df200f1a60f2fa24d0eadcd030eeff03249f979fb1c6e0ec8e112dc49", 0xc2, 0x3}], 0x2014885, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400040, 0x0) getsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getpeername$ax25(r1, &(0x7f0000000500)={{}, [@remote, @default, @default, @default, @remote, @netrom, @remote, @bcast]}, &(0x7f0000000180)=0x48) [ 324.928390][T12207] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 12:31:51 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 325.107082][T12213] EXT4-fs (loop1): unable to read superblock 12:31:51 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) fchdir(0xffffffffffffffff) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r0 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000077000)=""/133, 0x2800) [ 325.318218][T12221] EXT4-fs (loop1): unable to read superblock 12:31:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) listen(r1, 0x0) recvmmsg(r1, &(0x7f0000007080)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000004c0)=""/105, 0x69}, 0x1}, {{&(0x7f0000000540)=@phonet, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/163, 0xa3}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000940)=""/232, 0xe8}, {&(0x7f0000000a40)=""/217, 0xd9}, {&(0x7f0000002340)=""/4096, 0x1000}], 0x5, &(0x7f0000000b40)=""/220, 0xdc}, 0x401}, {{&(0x7f0000000c40)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/10, 0xa}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x2, &(0x7f0000000d40)}, 0x9}, {{&(0x7f0000000d80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000e00)=""/140, 0x8c}, {&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000000ec0)=""/28, 0x1c}, {&(0x7f0000000f00)=""/161, 0xa1}, {&(0x7f0000000fc0)=""/214, 0xd6}, {&(0x7f00000010c0)=""/37, 0x25}, {&(0x7f0000001100)=""/153, 0x99}, {&(0x7f00000011c0)=""/189, 0xbd}], 0x8, &(0x7f0000004340)=""/221, 0xdd}, 0xd88}, {{0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004440)=""/249, 0xf9}, {&(0x7f0000004540)=""/4096, 0x1000}, {&(0x7f0000005540)=""/83, 0x53}, {&(0x7f00000055c0)=""/39, 0x27}], 0x4, &(0x7f0000005640)=""/1, 0x1}, 0x8}, {{&(0x7f0000005680)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000057c0)=[{&(0x7f0000005700)=""/157, 0x9d}], 0x1}, 0x6}, {{&(0x7f0000005800)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000005980)=[{&(0x7f0000005880)=""/218, 0xda}], 0x1, &(0x7f00000059c0)=""/103, 0x67}, 0xffffff94}, {{&(0x7f0000005a40)=@phonet, 0x80, &(0x7f0000005b80)=[{&(0x7f0000005ac0)=""/133, 0x85}], 0x1}, 0xea}, {{&(0x7f0000005bc0)=@tipc, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000005c40)=""/63, 0x3f}, {&(0x7f0000005c80)=""/248, 0xf8}, {&(0x7f0000005d80)=""/78, 0x4e}, {&(0x7f0000005e00)=""/4096, 0x1000}, {&(0x7f0000006e00)=""/19, 0x13}, {&(0x7f0000006e40)=""/72, 0x48}, {&(0x7f0000006ec0)=""/247, 0xf7}], 0x7, &(0x7f0000007000)=""/88, 0x58}, 0x5}], 0x9, 0x80000001, &(0x7f00000071c0)={0x0, 0x989680}) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000001010000000000000600000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000ea000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002900"/574], 0x23e) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x440080, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="a141e1babb9b91c46ba05bc4af44bf21"}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000080)=0x6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf92a1a7511bf746bec66ba", 0x1334, 0x11, 0x0, 0x27) 12:31:51 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 12:31:52 executing program 0: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'none\x00', 0x0, 0x4}, {@empty}}, 0x44) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) 12:31:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 326.296174][T12245] IPVS: ftp: loaded support on port[0] = 21 12:31:52 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) listen(r1, 0x0) recvmmsg(r1, &(0x7f0000007080)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000004c0)=""/105, 0x69}, 0x1}, {{&(0x7f0000000540)=@phonet, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/163, 0xa3}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000940)=""/232, 0xe8}, {&(0x7f0000000a40)=""/217, 0xd9}, {&(0x7f0000002340)=""/4096, 0x1000}], 0x5, &(0x7f0000000b40)=""/220, 0xdc}, 0x401}, {{&(0x7f0000000c40)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/10, 0xa}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x2, &(0x7f0000000d40)}, 0x9}, {{&(0x7f0000000d80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000e00)=""/140, 0x8c}, {&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000000ec0)=""/28, 0x1c}, {&(0x7f0000000f00)=""/161, 0xa1}, {&(0x7f0000000fc0)=""/214, 0xd6}, {&(0x7f00000010c0)=""/37, 0x25}, {&(0x7f0000001100)=""/153, 0x99}, {&(0x7f00000011c0)=""/189, 0xbd}], 0x8, &(0x7f0000004340)=""/221, 0xdd}, 0xd88}, {{0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004440)=""/249, 0xf9}, {&(0x7f0000004540)=""/4096, 0x1000}, {&(0x7f0000005540)=""/83, 0x53}, {&(0x7f00000055c0)=""/39, 0x27}], 0x4, &(0x7f0000005640)=""/1, 0x1}, 0x8}, {{&(0x7f0000005680)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000057c0)=[{&(0x7f0000005700)=""/157, 0x9d}], 0x1}, 0x6}, {{&(0x7f0000005800)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000005980)=[{&(0x7f0000005880)=""/218, 0xda}], 0x1, &(0x7f00000059c0)=""/103, 0x67}, 0xffffff94}, {{&(0x7f0000005a40)=@phonet, 0x80, &(0x7f0000005b80)=[{&(0x7f0000005ac0)=""/133, 0x85}], 0x1}, 0xea}, {{&(0x7f0000005bc0)=@tipc, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000005c40)=""/63, 0x3f}, {&(0x7f0000005c80)=""/248, 0xf8}, {&(0x7f0000005d80)=""/78, 0x4e}, {&(0x7f0000005e00)=""/4096, 0x1000}, {&(0x7f0000006e00)=""/19, 0x13}, {&(0x7f0000006e40)=""/72, 0x48}, {&(0x7f0000006ec0)=""/247, 0xf7}], 0x7, &(0x7f0000007000)=""/88, 0x58}, 0x5}], 0x9, 0x80000001, &(0x7f00000071c0)={0x0, 0x989680}) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000001010000000000000600000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000ea000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002900"/574], 0x23e) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x440080, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="a141e1babb9b91c46ba05bc4af44bf21"}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000080)=0x6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf92a1a7511bf746bec66ba", 0x1334, 0x11, 0x0, 0x27) 12:31:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000077000)=""/133, 0x2800) [ 326.687114][T12245] chnl_net:caif_netlink_parms(): no params data found [ 326.898754][T12245] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.906795][T12245] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.916578][T12245] device bridge_slave_0 entered promiscuous mode [ 326.940401][T12245] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.947811][T12245] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.957211][T12245] device bridge_slave_1 entered promiscuous mode 12:31:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) listen(r1, 0x0) recvmmsg(r1, &(0x7f0000007080)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000004c0)=""/105, 0x69}, 0x1}, {{&(0x7f0000000540)=@phonet, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/163, 0xa3}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f0000000940)=""/232, 0xe8}, {&(0x7f0000000a40)=""/217, 0xd9}, {&(0x7f0000002340)=""/4096, 0x1000}], 0x5, &(0x7f0000000b40)=""/220, 0xdc}, 0x401}, {{&(0x7f0000000c40)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/10, 0xa}, {&(0x7f0000000cc0)=""/109, 0x6d}], 0x2, &(0x7f0000000d40)}, 0x9}, {{&(0x7f0000000d80)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000e00)=""/140, 0x8c}, {&(0x7f0000003340)=""/4096, 0x1000}, {&(0x7f0000000ec0)=""/28, 0x1c}, {&(0x7f0000000f00)=""/161, 0xa1}, {&(0x7f0000000fc0)=""/214, 0xd6}, {&(0x7f00000010c0)=""/37, 0x25}, {&(0x7f0000001100)=""/153, 0x99}, {&(0x7f00000011c0)=""/189, 0xbd}], 0x8, &(0x7f0000004340)=""/221, 0xdd}, 0xd88}, {{0x0, 0x0, &(0x7f0000005600)=[{&(0x7f0000004440)=""/249, 0xf9}, {&(0x7f0000004540)=""/4096, 0x1000}, {&(0x7f0000005540)=""/83, 0x53}, {&(0x7f00000055c0)=""/39, 0x27}], 0x4, &(0x7f0000005640)=""/1, 0x1}, 0x8}, {{&(0x7f0000005680)=@l2tp6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f00000057c0)=[{&(0x7f0000005700)=""/157, 0x9d}], 0x1}, 0x6}, {{&(0x7f0000005800)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000005980)=[{&(0x7f0000005880)=""/218, 0xda}], 0x1, &(0x7f00000059c0)=""/103, 0x67}, 0xffffff94}, {{&(0x7f0000005a40)=@phonet, 0x80, &(0x7f0000005b80)=[{&(0x7f0000005ac0)=""/133, 0x85}], 0x1}, 0xea}, {{&(0x7f0000005bc0)=@tipc, 0x80, &(0x7f0000006fc0)=[{&(0x7f0000005c40)=""/63, 0x3f}, {&(0x7f0000005c80)=""/248, 0xf8}, {&(0x7f0000005d80)=""/78, 0x4e}, {&(0x7f0000005e00)=""/4096, 0x1000}, {&(0x7f0000006e00)=""/19, 0x13}, {&(0x7f0000006e40)=""/72, 0x48}, {&(0x7f0000006ec0)=""/247, 0xf7}], 0x7, &(0x7f0000007000)=""/88, 0x58}, 0x5}], 0x9, 0x80000001, &(0x7f00000071c0)={0x0, 0x989680}) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000001010000000000000600000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000ea000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002900"/574], 0x23e) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x440080, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr="a141e1babb9b91c46ba05bc4af44bf21"}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000480)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000080)=0x6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf92a1a7511bf746bec66ba", 0x1334, 0x11, 0x0, 0x27) [ 327.045194][T12261] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 327.053199][T12261] FAT-fs (loop0): Filesystem has been set read-only [ 327.093762][T12245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 327.135032][T12261] FAT-fs (loop0): error, invalid access to FAT (entry 0x00006500) [ 327.144009][T12261] ===================================================== [ 327.150994][T12261] BUG: KMSAN: uninit-value in fat_evict_inode+0x2f4/0x920 [ 327.158103][T12261] CPU: 0 PID: 12261 Comm: syz-executor.0 Not tainted 5.6.0-rc2-syzkaller #0 [ 327.166763][T12261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.176810][T12261] Call Trace: [ 327.180179][T12261] dump_stack+0x1c9/0x220 [ 327.184529][T12261] kmsan_report+0xf7/0x1e0 [ 327.188954][T12261] __msan_warning+0x58/0xa0 [ 327.193471][T12261] fat_evict_inode+0x2f4/0x920 [ 327.198238][T12261] ? fat_write_inode+0x250/0x250 [ 327.203965][T12261] evict+0x4ab/0xe10 [ 327.207955][T12261] iput+0xa70/0xe10 [ 327.211777][T12261] fat_build_inode+0x6a3/0x840 [ 327.216564][T12261] vfat_lookup+0x660/0x9e0 [ 327.220991][T12261] ? setup+0x190/0x190 [ 327.225063][T12261] path_openat+0x3299/0x6bd0 [ 327.229706][T12261] do_filp_open+0x2b8/0x710 [ 327.234328][T12261] do_sys_openat2+0x92e/0xd40 [ 327.239022][T12261] __ia32_compat_sys_open+0x293/0x2f0 [ 327.244395][T12261] ? __ia32_sys_openat2+0x400/0x400 [ 327.249588][T12261] do_fast_syscall_32+0x3c7/0x6e0 [ 327.254667][T12261] entry_SYSENTER_compat+0x68/0x77 [ 327.259770][T12261] RIP: 0023:0xf7fb6d99 [ 327.263840][T12261] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 327.283452][T12261] RSP: 002b:00000000f5db10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000005 [ 327.291883][T12261] RAX: ffffffffffffffda RBX: 000000002054eff8 RCX: 0000000000000000 [ 327.299847][T12261] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 327.307814][T12261] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 327.315776][T12261] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 327.323737][T12261] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 327.331714][T12261] [ 327.334029][T12261] Uninit was created at: [ 327.338299][T12261] kmsan_save_stack_with_flags+0x3c/0x90 [ 327.343920][T12261] kmsan_alloc_page+0x12a/0x310 [ 327.348760][T12261] __alloc_pages_nodemask+0x5712/0x5e80 [ 327.354294][T12261] alloc_pages_current+0x67d/0x990 [ 327.359406][T12261] alloc_slab_page+0x111/0x12f0 [ 327.364244][T12261] new_slab+0x2bc/0x1130 [ 327.368491][T12261] ___slab_alloc+0x1533/0x1f30 [ 327.373248][T12261] kmem_cache_alloc+0xb23/0xd70 [ 327.378092][T12261] fat_alloc_inode+0x58/0x120 [ 327.382758][T12261] new_inode_pseudo+0xb1/0x590 [ 327.387506][T12261] new_inode+0x5a/0x3d0 [ 327.391655][T12261] fat_fill_super+0x634b/0x89b0 [ 327.396506][T12261] vfat_fill_super+0xa6/0xc0 [ 327.401110][T12261] mount_bdev+0x654/0x880 [ 327.405428][T12261] vfat_mount+0xc9/0xe0 [ 327.409569][T12261] legacy_get_tree+0x169/0x2e0 [ 327.414333][T12261] vfs_get_tree+0xdd/0x580 [ 327.418741][T12261] do_mount+0x365c/0x4ac0 [ 327.423059][T12261] __se_compat_sys_mount+0x3a8/0xa10 [ 327.428331][T12261] __ia32_compat_sys_mount+0x157/0x1b0 [ 327.433777][T12261] do_fast_syscall_32+0x3c7/0x6e0 [ 327.438793][T12261] entry_SYSENTER_compat+0x68/0x77 [ 327.443896][T12261] ===================================================== [ 327.450808][T12261] Disabling lock debugging due to kernel taint [ 327.456954][T12261] Kernel panic - not syncing: panic_on_warn set ... [ 327.463550][T12261] CPU: 0 PID: 12261 Comm: syz-executor.0 Tainted: G B 5.6.0-rc2-syzkaller #0 [ 327.473597][T12261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.483658][T12261] Call Trace: [ 327.486959][T12261] dump_stack+0x1c9/0x220 [ 327.491293][T12261] panic+0x3d5/0xc3e [ 327.495213][T12261] kmsan_report+0x1df/0x1e0 [ 327.499718][T12261] __msan_warning+0x58/0xa0 [ 327.504217][T12261] fat_evict_inode+0x2f4/0x920 [ 327.508983][T12261] ? fat_write_inode+0x250/0x250 [ 327.513914][T12261] evict+0x4ab/0xe10 [ 327.517814][T12261] iput+0xa70/0xe10 [ 327.521626][T12261] fat_build_inode+0x6a3/0x840 [ 327.526392][T12261] vfat_lookup+0x660/0x9e0 [ 327.530814][T12261] ? setup+0x190/0x190 [ 327.534876][T12261] path_openat+0x3299/0x6bd0 [ 327.539510][T12261] do_filp_open+0x2b8/0x710 [ 327.544048][T12261] do_sys_openat2+0x92e/0xd40 [ 327.548738][T12261] __ia32_compat_sys_open+0x293/0x2f0 [ 327.554115][T12261] ? __ia32_sys_openat2+0x400/0x400 [ 327.559311][T12261] do_fast_syscall_32+0x3c7/0x6e0 [ 327.564365][T12261] entry_SYSENTER_compat+0x68/0x77 [ 327.569472][T12261] RIP: 0023:0xf7fb6d99 [ 327.573547][T12261] Code: 90 e8 0b 00 00 00 f3 90 0f ae e8 eb f9 8d 74 26 00 89 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 327.593142][T12261] RSP: 002b:00000000f5db10cc EFLAGS: 00000296 ORIG_RAX: 0000000000000005 [ 327.601545][T12261] RAX: ffffffffffffffda RBX: 000000002054eff8 RCX: 0000000000000000 [ 327.609504][T12261] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 327.617476][T12261] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 327.625433][T12261] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 327.633407][T12261] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 327.642836][T12261] Kernel Offset: 0x23000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 327.654499][T12261] Rebooting in 86400 seconds..