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"]}, 0x1a8) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0xe1, 0x20, 0x3, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x8}, 0x800, 0x7, 0x7, 0x5, 0x3, 0xffffff81, 0x2, 0x0, 0x564f795, 0x0, 0x5}, 0x0, 0x2000000000000010, r0, 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7", 0x20}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r2, 0x0, 0x24002da8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x1b, 0x0, "0c7f70a167f6cc188cb61c00e740c14c32a9ab322fb8b57bba37c4d876ef58517c2cdde4c2a04a84ecfa7964b4f2f052f4a01d6fb697e016813b74913884da38", "941acb4e4d0917915e0930ccead6e91780ed6d9677f412287b88d52644d882c5", [0xffff8001, 0x64]}) 12:13:58 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:13:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0) 12:13:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:13:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4, 0x0) 12:13:58 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7f, 0x401}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0xe1, 0x20, 0x3, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x8}, 0x800, 0x7, 0x7, 0x5, 0x3, 0xffffff81, 0x2, 0x0, 0x564f795, 0x0, 0x5}, 0x0, 0x2000000000000010, r0, 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7", 0x20}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r2, 0x0, 0x24002da8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x1b, 0x0, "0c7f70a167f6cc188cb61c00e740c14c32a9ab322fb8b57bba37c4d876ef58517c2cdde4c2a04a84ecfa7964b4f2f052f4a01d6fb697e016813b74913884da38", "941acb4e4d0917915e0930ccead6e91780ed6d9677f412287b88d52644d882c5", [0xffff8001, 0x64]}) 12:13:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 315.241702][T16647] loop3: detected capacity change from 0 to 6 [ 315.249834][T16649] loop1: detected capacity change from 0 to 16 [ 315.269188][T16647] FAT-fs (loop3): bogus number of FAT sectors 12:13:58 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7f, 0x401}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) fcntl$dupfd(r1, 0x406, r0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0xe1, 0x20, 0x3, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7, 0x8}, 0x800, 0x7, 0x7, 0x5, 0x3, 0xffffff81, 0x2, 0x0, 0x564f795, 0x0, 0x5}, 0x0, 0x2000000000000010, r0, 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7", 0x20}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r2, 0x0, 0x24002da8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x1b, 0x0, "0c7f70a167f6cc188cb61c00e740c14c32a9ab322fb8b57bba37c4d876ef58517c2cdde4c2a04a84ecfa7964b4f2f052f4a01d6fb697e016813b74913884da38", "941acb4e4d0917915e0930ccead6e91780ed6d9677f412287b88d52644d882c5", [0xffff8001, 0x64]}) [ 315.333004][T16647] FAT-fs (loop3): Can't find a valid FAT filesystem 12:13:58 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:13:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x5, 0x0) 12:13:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0) 12:13:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:13:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}, 0x0, 0xb2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="2e2f076d21660000000000080000554384994bc992733c4513b397b6c0f2e5eba92ed6462f3fb975b4f8e2ae5df538c91f82ad675fd779"], &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, &(0x7f00000002c0)='#$\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)='squashfs\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f0000001c40)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dcbeec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1f04c7c4750eabfafcb9531b31e6a86827d1010c58e09ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab66c1aae1314d73817035bec1bea672cf1e926f4648a07a975bd89dc398712376610faa54f12495b4659be8673086f6f35432055bbc4ce05b8b961103673dff7f158052e62bfbdcddde6985f3f1ac5d9a94cc5320f05fd241a2d8363d44fcd0f8f364a091e9e3f46cceab14452d11f5574f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee5912e48d9033aba840fe38a9a0033d520bcf6b84c1436499d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab064fe0be362e54cfade6229d88a005a0004ac71a003d7b85d07191bed4e5a890826372212246f7ed569980e454f3d8731f5e7a237bc06d035a8d601f21746d886419f38b34a495046c6492b471c2f0cce8c9d4590e626c07c5a7f0081e7dc73846d0f7fe2c0ca440c5d3b501f28dd75778a46b9645edbef4ef8497f38f2d5c39757cca944b9fe9a3b1cb8000210121afc9c9316f46"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000340)={r1, r0, 0x2}, 0x10) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x111}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffe, 0x0) write$binfmt_elf64(r3, 0x0, 0x1a0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd=r3, 0x2a, 0x0, 0x9, 0x5, 0x1}, 0x3f) recvmsg$unix(r3, &(0x7f00000019c0)={&(0x7f0000000540)=@abs, 0x6e, &(0x7f00000018c0)=[{&(0x7f00000005c0)=""/238, 0xee}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/169, 0xa9}, {&(0x7f0000001780)=""/111, 0x6f}, {&(0x7f0000000200)=""/54, 0x36}, {&(0x7f0000001800)=""/155, 0x9b}], 0x6, &(0x7f0000000400)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000008000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x68}, 0x100) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001a00)={r5, r4, 0x1f}, 0x10) chroot(&(0x7f00000001c0)='./file0\x00') bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={r2, r1, 0x4, r1}, 0x10) openat$sysfs(0xffffffffffffff9c, 0x0, 0x200000, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) [ 315.466576][T16670] loop3: detected capacity change from 0 to 6 12:13:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:13:58 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 315.520772][T16670] FAT-fs (loop3): Directory bread(block 6) failed [ 315.525134][T16675] loop1: detected capacity change from 0 to 16 [ 315.548338][T16670] FAT-fs (loop3): Directory bread(block 6) failed 12:13:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0) 12:13:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6, 0x0) 12:13:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x81) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x7, 0x0, 0x0, 0x88000, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x8}, 0x44101, 0x0, 0x7, 0x3, 0x101, 0x0, 0x0, 0x0, 0x400, 0x0, 0x1f}, 0x0, 0x5, 0xffffffffffffffff, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50}, 0x80) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0xff, 0x9) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, &(0x7f0000000480)={{0x0, 0x4, 0x6, 0xff, 0x0, 0xa992, 0x1, 0x352, 0x1, 0x0, 0x0, 0x0, 0x1, 0x20, 0x1000}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f00000000c0)=0x2) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002d80)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="050000000000000000000600000008000300", @ANYRES32=r5, @ANYBLOB="0800050003000000"], 0x24}}, 0x0) 12:13:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 315.741213][T16692] loop3: detected capacity change from 0 to 6 [ 315.779035][T16699] loop1: detected capacity change from 0 to 16 12:13:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') mount$bpf(0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000440)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6389618a348cd424906f646570a9242030632d16cf556d4ca71c406c7bf3c9a03853e92f3638a75786ae4f9080182015c832e6eab754014b91d54fea4cb73963dca92fd4e38ac090973883c62e5d4bb5542f5d977209f5ed201547e9317bd17fb2894ce35e0eb59b3881c9ac46b31f5b42ade0c619b3ed1176e1769e646b54e21b24e51001e9e24331393108104ce7088ed21c2d1c61b74c9fc6c7abf4ba699dbbee33e8c67d81ac62d7ecd04651a50c4708061315cbd2443a09177abeae238dccaf1ac00353ef782da94db19bdb920290d6c082eb4aa44603275f4bce614e"]) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 12:13:58 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:13:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0) 12:13:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:13:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7, 0x0) [ 315.908670][T16714] loop3: detected capacity change from 0 to 6 [ 315.917598][ T37] audit: type=1804 audit(1630757639.015:151): pid=16709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/76/bus" dev="sda1" ino=14411 res=1 errno=0 [ 315.937605][T16720] loop0: detected capacity change from 0 to 8192 [ 315.946874][ C1] net_ratelimit: 470 callbacks suppressed 12:13:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 315.946890][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 315.969283][T16720] FAT-fs (loop0): Unrecognized mount option "ca4$odep$ 0c-UmL@l{ɠ8S/68WO 2TKOL9cܩ/8.]KT/]r G1{L^8ɬF[BvvdkT$C191L-aLǫi3}bFQ GD: z#̯Sx-MےJF'_KaN" or missing value 12:13:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x81) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x1, 0x1, 0x0, 0x7, 0x0, 0x0, 0x88000, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x8}, 0x44101, 0x0, 0x7, 0x3, 0x101, 0x0, 0x0, 0x0, 0x400, 0x0, 0x1f}, 0x0, 0x5, 0xffffffffffffffff, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50}, 0x80) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0xff, 0x9) syz_80211_join_ibss(&(0x7f0000000140)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r4, 0xc0709411, &(0x7f0000000480)={{0x0, 0x4, 0x6, 0xff, 0x0, 0xa992, 0x1, 0x352, 0x1, 0x0, 0x0, 0x0, 0x1, 0x20, 0x1000}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r4, 0x4008941a, &(0x7f00000000c0)=0x2) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002d80)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty}, 0xc) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="050000000000000000000600000008000300", @ANYRES32=r5, @ANYBLOB="0800050003000000"], 0x24}}, 0x0) 12:13:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0) [ 316.006765][T16725] loop1: detected capacity change from 0 to 16 [ 316.043964][ T37] audit: type=1804 audit(1630757639.135:152): pid=16728 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/76/bus" dev="sda1" ino=14411 res=1 errno=0 12:13:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x8, 0x0) 12:13:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 316.087526][T16727] loop0: detected capacity change from 0 to 8192 12:13:59 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r3, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f00000001c0)={0x9b0000, 0x268, 0x4, r0, 0x0, &(0x7f00000000c0)={0x990a93, 0x3f, '\x00', @p_u32=&(0x7f0000000080)=0x1}}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000180)="77690080000000f7dc00", 0xa}], 0x1, 0x1) close(r2) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) splice(r1, 0x0, r2, 0x0, 0xfffd, 0x0) r5 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$int_in(r5, 0x5421, &(0x7f0000000040)=0x800) 12:13:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 316.176135][T16747] loop3: detected capacity change from 0 to 6 [ 316.210080][T16752] loop1: detected capacity change from 0 to 16 12:13:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 316.371213][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.377820][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 12:13:59 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:13:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x9, 0x0) 12:13:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(0x0, 0x0, 0x0) 12:13:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, 0x0) 12:13:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(&(0x7f0000000100)=@filename='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x205c81, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="1b6a4569ea13219b3a2c3d83b3507454ffc1e861602bece61be3edc57721e38744f19876e006ffdd020f2626d7da811c15b5b5dfc32397c0bf6a9f3b3f433c14e9b7e0a3b85080"], &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x200f080, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) umount2(&(0x7f0000000300)='./file0\x00', 0xa) creat(&(0x7f0000000080)='./file0\x00', 0x8) 12:13:59 executing program 4: perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) close(r0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x5, 0x2, 0x5, 0x8, 0x0, 0x6, 0x5040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, 0x1, @perf_config_ext={0x3f}, 0x100, 0x5, 0x8, 0x7, 0xb862, 0x8182, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xe, r1, 0x1) syz_open_procfs(0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 12:13:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, 0x0) [ 316.775189][T16780] loop3: detected capacity change from 0 to 6 [ 316.782764][T16779] loop1: detected capacity change from 0 to 16 [ 316.812289][T16783] input: syz1 as /devices/virtual/input/input12 12:13:59 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x98, 0x0, 0x8, 0x5, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x890d}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x28}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_DATA={0x4c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0xbc}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x1000}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0xffffffc0}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x1ff}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x10000}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0xfff}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x20}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x80}, 0x4040010) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/126, 0x7e}, {&(0x7f0000000280)=""/249, 0xf9}, {&(0x7f0000000380)=""/14, 0xe}, {&(0x7f00000003c0)=""/156, 0x9c}], 0x4, 0x3f4, 0x9) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000500)={0x5, &(0x7f00000004c0)=[{}, {}, {}, {}, {}]}) r1 = openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x204403, 0x48) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x54, 0x0, 0x1, 0x101, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_HELP={0xc, 0x5, 0x0, 0x1, {0x8, 0x1, 'RAS\x00'}}, @CTA_ID={0x8}, @CTA_NAT_DST={0x2c, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V6_MINIP={0x14, 0x4, @private1}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x400c040}, 0x20000000) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000006c0)) r2 = syz_mount_image$ntfs(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x100000000, 0x7, &(0x7f0000001a40)=[{&(0x7f0000000780)="642374dc6d0c8e127a17cb98089de44ae22ac3b6813b08251e480d09079db49f8e735a466fd6362159d832928eaa77ca2833209b905a", 0x36, 0x7fffffff}, {&(0x7f00000007c0)="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", 0x1000, 0x691}, {&(0x7f00000017c0)="15b6241ffbf164a3f7bba48c8ef50924fd628d8e48758d9d750b30b1c3d48d455a05ea9134c5d40b3bfbfd8b6b11bfedf2a0b8e4a264d82f663bd3d9c15ee625288ac78828fe3ccdf1d11dfedcb16063b7aefdcc28f70c47d7a3df4aa00230e01e3e8f806ed321638464078c6f5a8818eec669decbc7606ce3e432f65926d35655e54871c3009f18038071040dc6d98af558c4bbedcab0470d70c0", 0x9b, 0x6}, {&(0x7f0000001880)="02f9935bbb3368ede38dbef3d79f", 0xe, 0x5}, {&(0x7f00000018c0)="a9b12af7602a92a8934f629c47b74a568689e2015a84a51377c4da5b6a3c030f640ffca2385fcf4de1ae2ad4eb7c0f1c907af2a6f679b704c270b250f6329bb61589d344dc2ed66c9b32074bcb9673ca53fc7e6929cf68b22136977371fb782b", 0x60, 0xc7a}, {&(0x7f0000001940)="845842ad6222995b583a9d2f16bc80bda004a716b2ed74db96ba753b0a59e89b5d66ae29524c0345f3314d55803469b50d77a621df5b61b14958f75936d0e3887bcfeb58b3b88bea447b22791178587695ac6a203c593d43d361ad05b13884a7feb4c752219c225c5dc215532b7c8cd96a09285d164a", 0x76, 0x6}, {&(0x7f00000019c0)="e951cf8a40cda59918a8d18f9875c1641bd0e24b228569bad89832318acf96d608059e47bf1e1e4429caa6acb5b3c63e70908f02ca27092fe68c833a58654d9397160f6fe93f8b78ff5aa05903c8b9c48a1a6ce05fa8a4a15372cd8ef944f1e5e0b00386b030a8ab78d582fe15925fcdbb60f44e639edec5d3d467402dd5", 0x7e, 0x8}], 0x10, &(0x7f0000001b00)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}], [{@seclabel}]}) r3 = openat(r2, &(0x7f0000001b40)='./file0\x00', 0x36000, 0xc) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x517881, 0x0) io_uring_enter(r4, 0x4, 0x136, 0x2, &(0x7f0000001bc0)={[0x40]}, 0x8) r5 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000001c00), 0x2, 0x0) write$binfmt_elf64(r5, &(0x7f0000001c40)={{0x7f, 0x45, 0x4c, 0x46, 0x26, 0x26, 0xd4, 0x0, 0x7e, 0x3, 0x3e, 0x0, 0x33e, 0x40, 0x289, 0x65d, 0xe5, 0x38, 0x1, 0x1f, 0x3, 0x5}, [{0x7, 0x7, 0x4, 0x2, 0x10000, 0xfea, 0x7, 0x7b}, {0x6, 0x6, 0x9e19, 0x9, 0x1ff, 0x81, 0x69, 0x1000}], "5b473abe8e46c7e2f7d1529d58b87a8480ac86d0b82554b386157262083c931c69222bf3b69ad718ad3a888b0e0da9782d96f78f7d8c04a8a307b28e47151182fc95860bd131a34a9d6a1dcfb7ae1c7e3dcc35c7d3534af04bbacfbadbedcdb2c861305de7c3ab63a396f581cf78ac83a10d6a72eef63957266e307f00d1a3728a03c49dbe99e41677ec17afa1d07122e4929c63d64e5e480662c54af544addcf807edea81b28d40cd238919498938dbd3fbd5b52e257e9598ef0d8cb79f49cfc1cf97", ['\x00', '\x00', '\x00', '\x00']}, 0x573) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f00000022c0)={&(0x7f00000021c0)={0x10, 0x0, 0x0, 0x4088000}, 0xc, &(0x7f0000002280)={&(0x7f0000002200)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x34}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x4008844) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000002300)={0x1, 0x0, 0x2}) sendmsg$NL80211_CMD_SET_CHANNEL(r3, &(0x7f0000002400)={&(0x7f0000002340)={0x10, 0x0, 0x0, 0x102880}, 0xc, &(0x7f00000023c0)={&(0x7f0000002380)={0x40, 0x0, 0x2, 0x70bd28, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x401, 0x6f}}}}, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x91}, 0x8800) sendmsg$IPSET_CMD_SWAP(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000002480)={0x10, 0x0, 0x0, 0x10400010}, 0xc, &(0x7f0000002500)={&(0x7f00000024c0)={0x20, 0x6, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x3}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x1) 12:14:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xa, 0x0) [ 316.829062][T16780] FAT-fs (loop3): Directory bread(block 6) failed [ 316.850162][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(0x0, 0x0, 0x0) 12:14:00 executing program 4: perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) close(r0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x5, 0x2, 0x5, 0x8, 0x0, 0x6, 0x5040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, 0x1, @perf_config_ext={0x3f}, 0x100, 0x5, 0x8, 0x7, 0xb862, 0x8182, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xe, r1, 0x1) syz_open_procfs(0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) [ 316.913234][T16802] input: syz1 as /devices/virtual/input/input13 [ 316.949968][T16805] loop0: detected capacity change from 0 to 264192 12:14:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, 0x0) [ 317.031175][T16820] loop1: detected capacity change from 0 to 16 [ 317.032380][T16821] loop3: detected capacity change from 0 to 6 [ 317.056431][T16827] loop0: detected capacity change from 0 to 264192 [ 317.091412][T16828] input: syz1 as /devices/virtual/input/input14 [ 317.138760][T16821] FAT-fs (loop3): Directory bread(block 6) failed 12:14:00 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x0, 0x1}}, 0x0, 0x0, 0x0}) 12:14:00 executing program 0: perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000)={0x1}, 0x8) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) close(r0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x5, 0x2, 0x5, 0x8, 0x0, 0x6, 0x5040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, 0x1, @perf_config_ext={0x3f}, 0x100, 0x5, 0x8, 0x7, 0xb862, 0x8182, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xe, r1, 0x1) syz_open_procfs(0x0, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 12:14:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xc, 0x0) 12:14:00 executing program 4: prlimit64(0x0, 0xc, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) getpgid(r0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./bus\x00', 0x1}, 0x10) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x4000, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x80000005) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x30, 0x1405, 0x100, 0x70bd2d, 0x25dfdbfc, "", [{{0x8, 0x1, 0x2}, {0x8}}, {{0x8, 0x1, 0x2}, {0x8, 0x3, 0x4}}]}, 0x30}}, 0x1) pivot_root(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)='./file0\x00') 12:14:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(0x0, 0x0, 0x0) [ 317.730415][T16863] loop1: detected capacity change from 0 to 16 [ 317.740146][T16864] loop3: detected capacity change from 0 to 6 [ 317.772293][T16868] input: syz1 as /devices/virtual/input/input15 [ 317.781958][T16864] FAT-fs (loop3): Directory bread(block 6) failed [ 317.808306][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x0, 0x1}}, 0x0, 0x0, 0x0}) 12:14:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xd, 0x0) 12:14:01 executing program 3 (fault-call:1 fault-nth:0): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0) 12:14:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc6553532, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8}, 0x0, 0xa, 0xffffffffffffffff, 0x1) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, &(0x7f00000022c0)=ANY=[@ANYBLOB, @ANYBLOB="820007abf640c2bb46", @ANYRESDEC, @ANYBLOB="ed1cfa05f25464cc8d28330aa09a09ef5178fbb6ff9adc75717711b289b1c73d3e62e712831cf9a208c53cd2d44195d11f3e", @ANYRES32=r0, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYBLOB="04000600e2ffffff", @ANYRES32=0x0, @ANYBLOB="08007dd0", @ANYBLOB, @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) openat(r0, 0x0, 0x80100, 0x83) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x8200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000380)=ANY=[], 0x44) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x5) fcntl$setstatus(r1, 0x4, 0x44000) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x4, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/ram3', 0x0, 0x0) read$FUSE(r2, &(0x7f00000000c0)={0x2020}, 0x2020) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f00000021c0)='./control\x00', 0x1) sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000002100), 0xc, &(0x7f0000002280)={&(0x7f0000002380)=ANY=[@ANYBLOB="3684175204e58175d0937d8fbb2efb0ad492afcc5639c2a9681c3549afcfad83f131d446701c36e4c01f48f817cae73f8c5d51cfaf80a800982c6a52296f8e0f741217cdffb3bd579a0752f5c260fd60e6828a8dc853be52d2947e6b826f5a10854fb7f7048246f4c8d2aade03737a67cd714be394d82709db418bd51d7b5a83516853f255a95aa0161d8579e033c56be4e987d677d8b682e0d819341c7dd51c354471524ec6329497e8f023fe4c00fe5f1d858f4b25c48af84be9e06f0782f0cffef82a0e7c4c6bf2c81d3317532bf21fa5f2418872", @ANYRES16=0x0, @ANYBLOB="00082bbd70007cdb8ad297"], 0x68}}, 0x44080) statfs(&(0x7f0000002140)='./control\x00', &(0x7f0000002200)=""/1) 12:14:01 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x0, 0x1}}, 0x0, 0x0, 0x0}) [ 318.000246][T16897] loop1: detected capacity change from 0 to 16 [ 318.004650][T16898] loop3: detected capacity change from 0 to 6 [ 318.021016][T16901] loop0: detected capacity change from 0 to 4096 [ 318.046168][T16898] FAT-fs (loop3): Directory bread(block 6) failed 12:14:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe, 0x0) [ 318.071113][T16898] FAULT_INJECTION: forcing a failure. [ 318.071113][T16898] name failslab, interval 1, probability 0, space 0, times 0 [ 318.089674][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 318.116597][T16901] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 318.129593][T16898] CPU: 1 PID: 16898 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 318.138195][T16898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.148245][T16898] Call Trace: [ 318.151519][T16898] dump_stack_lvl+0xcd/0x134 [ 318.156141][T16898] should_fail.cold+0x5/0xa [ 318.160649][T16898] ? getname_flags.part.0+0x50/0x4f0 [ 318.166310][T16898] should_failslab+0x5/0x10 [ 318.170812][T16898] kmem_cache_alloc+0x5e/0x4a0 [ 318.175652][T16898] getname_flags.part.0+0x50/0x4f0 [ 318.180840][T16898] __x64_sys_mknod+0xff/0x170 [ 318.185507][T16898] do_syscall_64+0x35/0xb0 [ 318.189916][T16898] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.195799][T16898] RIP: 0033:0x4665f9 [ 318.199676][T16898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.219532][T16898] RSP: 002b:00007ffb7c068188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 318.227935][T16898] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 318.235976][T16898] RDX: 0000000000000706 RSI: 0000000000000000 RDI: 00000000200000c0 [ 318.243932][T16898] RBP: 00007ffb7c0681d0 R08: 0000000000000000 R09: 0000000000000000 [ 318.251994][T16898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 12:14:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1}}, 0x0, 0x0, 0x0}) [ 318.259948][T16898] R13: 00007fffdf1e6e2f R14: 00007ffb7c068300 R15: 0000000000022000 12:14:01 executing program 3 (fault-call:1 fault-nth:1): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0) [ 318.297737][ T37] kauditd_printk_skb: 12 callbacks suppressed [ 318.297752][ T37] audit: type=1804 audit(1630757641.395:161): pid=16914 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/79/bus" dev="sda1" ino=14456 res=1 errno=0 12:14:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1}}, 0x0, 0x0, 0x0}) [ 318.358482][T16923] loop1: detected capacity change from 0 to 16 [ 318.483785][T16930] loop3: detected capacity change from 0 to 6 [ 318.521026][T16930] FAT-fs (loop3): Directory bread(block 6) failed [ 318.564834][ T37] audit: type=1800 audit(1630757641.665:162): pid=16895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14448 res=0 errno=0 [ 318.566074][T16930] FAULT_INJECTION: forcing a failure. [ 318.566074][T16930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 318.641180][T16930] CPU: 1 PID: 16930 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 318.649935][T16930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.660018][T16930] Call Trace: [ 318.663298][T16930] dump_stack_lvl+0xcd/0x134 [ 318.667897][T16930] should_fail.cold+0x5/0xa [ 318.672408][T16930] strncpy_from_user+0x34/0x3e0 [ 318.677262][T16930] getname_flags.part.0+0x95/0x4f0 [ 318.680735][ T37] audit: type=1804 audit(1630757641.665:163): pid=16895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir636813774/syzkaller.tp3IRq/100/bus" dev="sda1" ino=14448 res=1 errno=0 [ 318.682376][T16930] __x64_sys_mknod+0xff/0x170 [ 318.682404][T16930] do_syscall_64+0x35/0xb0 [ 318.717028][T16930] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.723022][T16930] RIP: 0033:0x4665f9 [ 318.726920][T16930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.746539][T16930] RSP: 002b:00007ffb7c068188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 318.754950][T16930] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 318.762917][T16930] RDX: 0000000000000706 RSI: 0000000000000000 RDI: 00000000200000c0 [ 318.770886][T16930] RBP: 00007ffb7c0681d0 R08: 0000000000000000 R09: 0000000000000000 [ 318.778856][T16930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.786827][T16930] R13: 00007fffdf1e6e2f R14: 00007ffb7c068300 R15: 0000000000022000 [ 318.821783][ T37] audit: type=1800 audit(1630757641.665:164): pid=16895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14448 res=0 errno=0 12:14:02 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000000280)="20000000000200001900000090ed0c7a75a18de97b0000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012036ee7d9621ab368ba0c2bb71361caa39d14adddedffc584397f3e6605d3f4f2a76919b32ee4f0941a362df6be5075260bee0ad8b914ad98", 0x9d, 0x400}, {&(0x7f00000001c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000000140)="ed41000010000000daf4755fdbf46569dbf4655f00000000000004008000000000000800050000000af30100040000000000040000000000090000001089609ee1f793c5", 0x44, 0x4400}], 0x800800, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') open(&(0x7f0000000000)='./file1\x00', 0x8800, 0x3) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) lremovexattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000340)=@known='security.apparmor\x00') perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r0, &(0x7f00000001c0)=ANY=[], 0x44) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 12:14:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf, 0x0) 12:14:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f00000003c0)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0xf, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @mptcp=@remove_addr={0x1e, 0x3}, @nop, @exp_fastopen={0xfe, 0x9, 0xf989, "61ee5bd5ce"}, @generic={0x0, 0xb, "fc85a161d9825013d6"}, @md5sig={0x13, 0x12, "91d785d58954605c802acf9f965fe399"}, @sack={0x5, 0xa, [0x0, 0x0]}, @exp_smc={0xfe, 0x6}]}}}}}}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r1, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) accept4$inet(r1, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) 12:14:02 executing program 3 (fault-call:1 fault-nth:2): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0) 12:14:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1}}, 0x0, 0x0, 0x0}) 12:14:02 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 319.293700][T16953] loop1: detected capacity change from 0 to 16 12:14:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x10, 0xf, 0x7, 0x4, 0x0, 0x2, 0x2c020, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x80, 0xa, 0x0, 0x8, 0x4, 0x2a6, 0x7, 0x0, 0x9a3f, 0x0, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xb) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r4, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x6, 0x81, 0x1, 0x0, 0xffffffff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0xac20, 0x2, 0x6, 0x3, 0xfffffffffffffff7, 0x6, 0x9, 0x0, 0x2, 0x0, 0x5}, 0x0, 0xd, r4, 0x1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) r5 = gettid() r6 = dup2(r2, r1) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r6, 0x80045700, &(0x7f00000000c0)) tkill(r5, 0x3) [ 319.334971][T16959] loop3: detected capacity change from 0 to 6 [ 319.355659][ T37] audit: type=1804 audit(1630757642.455:165): pid=16958 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/80/bus" dev="sda1" ino=14480 res=1 errno=0 12:14:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x10, 0x0) 12:14:02 executing program 5 (fault-call:4 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 319.360656][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 319.396922][T16961] loop4: detected capacity change from 0 to 4096 [ 319.412175][T16959] FAT-fs (loop3): Directory bread(block 6) failed [ 319.429611][T16966] FAULT_INJECTION: forcing a failure. [ 319.429611][T16966] name failslab, interval 1, probability 0, space 0, times 0 [ 319.438687][T16961] EXT4-fs (loop4): couldn't mount RDWR because of unsupported optional features (e76e0000) [ 319.481335][ T37] audit: type=1804 audit(1630757642.565:166): pid=16968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/80/bus" dev="sda1" ino=14480 res=1 errno=0 [ 319.509620][T16975] loop1: detected capacity change from 0 to 16 [ 319.520287][T16966] CPU: 1 PID: 16966 Comm: syz-executor.3 Not tainted 5.14.0-syzkaller #0 [ 319.520454][T16972] FAULT_INJECTION: forcing a failure. [ 319.520454][T16972] name failslab, interval 1, probability 0, space 0, times 0 [ 319.529020][T16966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.529038][T16966] Call Trace: [ 319.529049][T16966] dump_stack_lvl+0xcd/0x134 [ 319.529077][T16966] should_fail.cold+0x5/0xa [ 319.529097][T16966] ? __d_alloc+0x2a/0x950 [ 319.529117][T16966] should_failslab+0x5/0x10 [ 319.529137][T16966] kmem_cache_alloc+0x5e/0x4a0 [ 319.529157][T16966] ? rcu_read_lock_sched_held+0xd/0x70 [ 319.529176][T16966] __d_alloc+0x2a/0x950 [ 319.529196][T16966] d_alloc+0x4a/0x230 [ 319.529215][T16966] d_alloc_parallel+0xe2/0x19f0 [ 319.596653][T16966] ? kernel_text_address+0xbd/0xf0 [ 319.601773][T16966] ? __kernel_text_address+0x9/0x30 [ 319.607053][T16966] ? create_prof_cpu_mask+0x20/0x20 [ 319.612509][T16966] ? rcu_read_lock_sched_held+0xd/0x70 [ 319.617961][T16966] ? __d_lookup_rcu+0x6c0/0x6c0 [ 319.622806][T16966] ? rcu_read_lock_sched_held+0xd/0x70 [ 319.628276][T16966] ? lockdep_init_map_type+0x2c3/0x7b0 [ 319.633750][T16966] ? lockdep_init_map_type+0x2c3/0x7b0 [ 319.639203][T16966] __lookup_slow+0x193/0x480 [ 319.643784][T16966] ? do_raw_spin_unlock+0x171/0x230 [ 319.648978][T16966] ? page_put_link+0x220/0x220 [ 319.653916][T16966] ? zlib_tr_align.cold+0x2a1/0x2ff [ 319.659383][T16966] ? zlib_tr_align.cold+0x2a1/0x2ff [ 319.664577][T16966] ? projid_m_show+0x220/0x220 [ 319.669331][T16966] ? inode_permission.part.0+0x3e6/0x440 [ 319.675134][T16966] walk_component+0x40f/0x6a0 [ 319.679808][T16966] ? handle_dots.part.0+0x15e0/0x15e0 [ 319.685173][T16966] ? make_kuid+0x1e/0x30 [ 319.689427][T16966] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 319.695663][T16966] ? generic_permission+0x121/0x5b0 [ 319.700853][T16966] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 319.707094][T16966] ? security_inode_permission+0xc5/0xf0 [ 319.712904][T16966] link_path_walk.part.0+0x757/0xd00 [ 319.718279][T16966] ? walk_component+0x6a0/0x6a0 [ 319.723131][T16966] path_parentat+0xb1/0x1c0 [ 319.727803][T16966] __filename_parentat+0x1bb/0x5a0 [ 319.733085][T16966] ? path_parentat+0x1c0/0x1c0 [ 319.737864][T16966] ? do_syscall_64+0x35/0xb0 [ 319.742454][T16966] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.748603][T16966] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 319.754859][T16966] ? rcu_read_lock_sched_held+0xd/0x70 [ 319.760333][T16966] ? lock_acquire+0x442/0x510 [ 319.765002][T16966] ? get_pid_task+0xe8/0x210 [ 319.769585][T16966] ? ksys_write+0x212/0x250 [ 319.774256][T16966] ? lock_downgrade+0x6e0/0x6e0 [ 319.779117][T16966] ? __mutex_lock+0x21c/0x12f0 [ 319.783898][T16966] ? __fget_files+0x21b/0x3e0 [ 319.788581][T16966] __filename_create+0xa1/0x480 [ 319.793527][T16966] ? __filename_parentat+0x5a0/0x5a0 [ 319.798995][T16966] ? lock_downgrade+0x6e0/0x6e0 [ 319.803845][T16966] ? kmem_cache_alloc+0x46/0x4a0 [ 319.808779][T16966] ? lock_downgrade+0x6e0/0x6e0 [ 319.813625][T16966] ? lock_acquire+0x442/0x510 [ 319.818380][T16966] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 319.824620][T16966] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 319.830860][T16966] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 319.837123][T16966] do_mknodat+0x185/0x530 [ 319.841485][T16966] ? getname_uflags+0xe0/0xe0 [ 319.846160][T16966] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 319.852400][T16966] ? getname_flags.part.0+0x1dd/0x4f0 [ 319.857956][T16966] __x64_sys_mknod+0x11a/0x170 [ 319.862763][T16966] do_syscall_64+0x35/0xb0 [ 319.867185][T16966] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.873084][T16966] RIP: 0033:0x4665f9 [ 319.876988][T16966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.896778][T16966] RSP: 002b:00007ffb7c047188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 319.905198][T16966] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665f9 [ 319.914214][T16966] RDX: 0000000000000706 RSI: 0000000000000000 RDI: 00000000200000c0 [ 319.922209][T16966] RBP: 00007ffb7c0471d0 R08: 0000000000000000 R09: 0000000000000000 [ 319.930354][T16966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.938330][T16966] R13: 00007fffdf1e6e2f R14: 00007ffb7c047300 R15: 0000000000022000 [ 319.948761][T16972] CPU: 0 PID: 16972 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 319.957232][T16972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.967657][T16972] Call Trace: [ 319.970924][T16972] dump_stack_lvl+0xcd/0x134 [ 319.975510][T16972] should_fail.cold+0x5/0xa [ 319.980006][T16972] ? tomoyo_realpath_from_path+0xc3/0x620 [ 319.988064][T16972] should_failslab+0x5/0x10 [ 319.992564][T16972] __kmalloc+0x72/0x330 [ 319.996712][T16972] ? rcu_read_lock_sched_held+0xd/0x70 [ 320.002341][T16972] tomoyo_realpath_from_path+0xc3/0x620 [ 320.008143][T16972] ? tomoyo_profile+0x42/0x50 [ 320.012903][T16972] tomoyo_path_number_perm+0x1d5/0x590 [ 320.018358][T16972] ? tomoyo_path_number_perm+0x18d/0x590 [ 320.024075][T16972] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 320.029873][T16972] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 320.036110][T16972] ? rcu_read_lock_sched_held+0xd/0x70 [ 320.041993][T16972] ? lock_acquire+0x442/0x510 [ 320.046665][T16972] ? lock_downgrade+0x6e0/0x6e0 [ 320.051510][T16972] ? lock_downgrade+0x6e0/0x6e0 [ 320.056353][T16972] ? lock_acquire+0x442/0x510 [ 320.061023][T16972] ? rcu_read_lock_sched_held+0xd/0x70 [ 320.066496][T16972] ? lock_release+0x522/0x720 [ 320.071181][T16972] ? __context_tracking_exit+0xb8/0xe0 [ 320.076637][T16972] ? __fget_files+0x23d/0x3e0 [ 320.081325][T16972] security_file_ioctl+0x50/0xb0 [ 320.086257][T16972] __x64_sys_ioctl+0xb3/0x200 [ 320.090922][T16972] do_syscall_64+0x35/0xb0 [ 320.095329][T16972] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.101215][T16972] RIP: 0033:0x4665f9 [ 320.106313][T16972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.125917][T16972] RSP: 002b:00007f9d03088188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.134327][T16972] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 320.142287][T16972] RDX: 0000000020000480 RSI: 00000000c0105502 RDI: 0000000000000004 [ 320.150248][T16972] RBP: 00007f9d030881d0 R08: 0000000000000000 R09: 0000000000000000 [ 320.158211][T16972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.166270][T16972] R13: 00007ffc7b8732df R14: 00007f9d03088300 R15: 0000000000022000 12:14:03 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 320.195668][T16961] loop4: detected capacity change from 0 to 4096 12:14:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x11, 0x0) 12:14:03 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x10, 0xf, 0x7, 0x4, 0x0, 0x2, 0x2c020, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x80, 0xa, 0x0, 0x8, 0x4, 0x2a6, 0x7, 0x0, 0x9a3f, 0x0, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xb) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r4, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x6, 0x81, 0x1, 0x0, 0xffffffff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0xac20, 0x2, 0x6, 0x3, 0xfffffffffffffff7, 0x6, 0x9, 0x0, 0x2, 0x0, 0x5}, 0x0, 0xd, r4, 0x1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) r5 = gettid() r6 = dup2(r2, r1) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r6, 0x80045700, &(0x7f00000000c0)) tkill(r5, 0x3) 12:14:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x10, 0xf, 0x7, 0x4, 0x0, 0x2, 0x2c020, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x80, 0xa, 0x0, 0x8, 0x4, 0x2a6, 0x7, 0x0, 0x9a3f, 0x0, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xb) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r4, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xff, 0x6, 0x81, 0x1, 0x0, 0xffffffff, 0x100, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000080), 0x9}, 0xac20, 0x2, 0x6, 0x3, 0xfffffffffffffff7, 0x6, 0x9, 0x0, 0x2, 0x0, 0x5}, 0x0, 0xd, r4, 0x1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000022c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) r5 = gettid() r6 = dup2(r2, r1) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r6, 0x80045700, &(0x7f00000000c0)) tkill(r5, 0x3) [ 320.355494][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 320.387559][ T37] audit: type=1804 audit(1630757643.445:167): pid=16991 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/81/bus" dev="sda1" ino=13894 res=1 errno=0 [ 320.415403][T16972] ERROR: Out of memory at tomoyo_realpath_from_path. [ 320.446677][T16972] usb usb9: usbfs: process 16972 (syz-executor.5) did not claim interface 0 before use [ 320.469774][T17003] loop1: detected capacity change from 0 to 16 12:14:03 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r1, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) r2 = openat$vcsa(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000340)={@private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x6, 0x1f, 0x8, 0x500, 0x3, 0x80000, r3}) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20020800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@ipv6_getaddrlabel={0x6c, 0x4a, 0x200, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x1f, 0x0, r3, 0x800}, [@IFAL_ADDRESS={0x14, 0x1, @private0}, @IFAL_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFAL_ADDRESS={0x14, 0x1, @private1}, @IFAL_ADDRESS={0x14, 0x1, @empty}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40800}, 0x4044000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000d40)=ANY=[@ANYBLOB="3c0000001000390400000000000091dea01a0000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800b00010062726964676500000c00028008001d0000000000"], 0x3c}}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) [ 320.558638][ T37] audit: type=1804 audit(1630757643.545:168): pid=17000 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/81/bus" dev="sda1" ino=13894 res=1 errno=0 [ 320.575378][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x0, 0x0) 12:14:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) shmat(0xffffffffffffffff, &(0x7f00003f9000/0x4000)=nil, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c00170100000000011700080000000008007809140b2a3a08020000010000010a00660069006c0065", 0xa1, 0x8b000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='iocharset=ascii']) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='efivarfs\x00', 0x2000, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa') r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/92, 0x5c) openat(r0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x94) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x2f, 0x40, 0x0, 0x0, 0x11, @mcast1, @private0, 0x1, 0x1, 0x6444, 0x80000000}}) 12:14:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x13, 0x0) 12:14:03 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./bus\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x400080, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) rmdir(&(0x7f0000000080)='./file0\x00') mount$overlay(0x40000d, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000200)=ANY=[], 0x116) [ 320.638167][ T37] audit: type=1804 audit(1630757643.655:169): pid=17011 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/82/bus" dev="sda1" ino=14469 res=1 errno=0 12:14:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x2, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 320.687839][T17025] loop4: detected capacity change from 0 to 2224 [ 320.696428][T17026] usb usb9: usbfs: process 17026 (syz-executor.5) did not claim interface 0 before use [ 320.706000][T17028] loop1: detected capacity change from 0 to 16 [ 320.710269][ T37] audit: type=1804 audit(1630757643.775:170): pid=17022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/82/bus" dev="sda1" ino=14469 res=1 errno=0 12:14:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x18, 0x0) 12:14:03 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) shmat(0xffffffffffffffff, &(0x7f00003f9000/0x4000)=nil, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c00170100000000011700080000000008007809140b2a3a08020000010000010a00660069006c0065", 0xa1, 0x8b000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='iocharset=ascii']) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='efivarfs\x00', 0x2000, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa') r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/92, 0x5c) openat(r0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x94) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x2f, 0x40, 0x0, 0x0, 0x11, @mcast1, @private0, 0x1, 0x1, 0x6444, 0x80000000}}) 12:14:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x10, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) shmat(0xffffffffffffffff, &(0x7f00003f9000/0x4000)=nil, 0x0) process_vm_writev(0x0, &(0x7f0000c22000), 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a3a080200000100000101002200160100000000011600080000000008007809140b2a3a080200000100000101013400180100000000011864000000000000647809140b2a3a08000000010000011200660069006c0065002e0063006f006c0064002c00170100000000011700080000000008007809140b2a3a08020000010000010a00660069006c0065", 0xa1, 0x8b000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='iocharset=ascii']) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='efivarfs\x00', 0x2000, &(0x7f00000001c0)='\xaa\xaa\xaa\xaa\xaa') r1 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000380)=""/92, 0x5c) openat(r0, &(0x7f0000000100)='./file0\x00', 0x200000, 0x94) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x2f, 0x40, 0x0, 0x0, 0x11, @mcast1, @private0, 0x1, 0x1, 0x6444, 0x80000000}}) [ 320.814233][T17044] loop3: detected capacity change from 0 to 6 [ 320.842309][T17044] FAT-fs (loop3): Directory bread(block 6) failed [ 320.856768][T17044] FAT-fs (loop3): Directory bread(block 6) failed [ 320.917605][T17058] loop1: detected capacity change from 0 to 16 [ 320.921606][T17057] loop4: detected capacity change from 0 to 2224 [ 320.949168][T17063] loop0: detected capacity change from 0 to 2224 12:14:04 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x2, 0x0) 12:14:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x60, 0x0) 12:14:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4601, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:04 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) kcmp(0x0, r1, 0x5, r2, 0xffffffffffffffff) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000140)={r4, 0x8, 0x6}) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f0000000180)) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f00000001c0)={r0, 0x2, 0x7}) r6 = syz_mount_image$pvfs2(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x6, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000340)="84a43921838a491e941805ff55a988050acd93bdee9883743bd9d774348ba38409ec72183964001372c5a028eb1552bc80279bfd0d700cc91fe3cbdb26ab3f8774843e05522b27fb7e15364239006f7b54c489531b01947870fecd6dcd0baa15c7eecf84d80a7f16b683851b613da9807171e2e4d8138de1b7a1737761e865a239d8f1803ee41fe035e1975ff4b42001e773", 0x92, 0x9}, {&(0x7f0000000400)="071d05e59ab44341db3d6cbfc180629b4f57a79b36cdcd10e0b7551a351e1a28fbf774a097ea825879afb88092eb25b4fd83fce8ca5e1ceb81c048ec8fc39cfa958dc9ec984348a329083c98afff7336e71c45544f97b997a63f7a34ae611d83d8b979c2fb16649bddc7ad67528e113315cbd4f9dfa5b9af22b3", 0x7a, 0xda4}, {&(0x7f0000000480)="ded8304c05166da62e6106f8b5ed564f2510d45c8e3955cd91bf460c2f889f21d802c6b7d62945b9cbb235f7754e805d461011c7eac17a4b775fadf6c634b76e120ed94a6162018537c4a493282243cec8abdc84d02865981da85fb36124df5fba8646787149e328bd9aed58", 0x6c, 0x8b7}, {&(0x7f0000000500)="07ca4e4e88dd30ef0eb274ac416fe7be2bbc6717a1bade224a795097884457cc6e89bbc49b2daa85dd3cbade9b12e00bedf5fd263a54201e79d470dcd0cc6f9edfa97cd738a2dec4415e993bab3fc0a54af2a05c336805ef9adc2282ae8bc3ba77f7542bdc4490f1c9b2837d80dd27cd994d4a5611e4b7f834c3d731046583b012fc4a0b71d7bd0df064e2af7c4c7f6214fc8cb9f2ad9f5e62727c9d507a89bd859eb04b9d6709ef0074111f1963c50381d69f906d6066", 0xb7, 0x7f}, {&(0x7f00000005c0)="ca353d72622329233b9433d995b6010c45059595f4c6fbc68961f71719a7de1e509909acff7e6a9d57ce714db4c8f7e861c998311a24548a10f5b177066d146e57533487b9d12403aa717e1e2754953e0a33f14acc9d1373280e21ef0105f93ad92d51e088a0884cf05524655e7714dba57909d17b1fb3c6e61be63b500cf4c5e30082dfdddbc7987f613a1315a9beefddc4c95c0c1a393eb8f57e9b221e6f84d2", 0xa1, 0x1}, {&(0x7f0000000680)="d5359066c489c82f7939", 0xa, 0x6}], 0x201031, &(0x7f0000000780)={[{}, {'/dev/null\x00'}, {'/dev/null\x00'}], [{@fowner_gt}, {@pcr={'pcr', 0x3d, 0x9}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}]}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000800)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000000200)="60cf44e649162430f1fb444c7c29c6be61b1714d23d52389a9b3cd6fcb0a5a0d1236ea6a431f906fbbbb7cdcd05a0aad6c2e2ee823902759d315a7b0c634207b491436ee01e8d34b4ee2b8e2c589f72490e9cfd692d03f608d41041160a841ea7310be774a3db76f310a1c3c611039131dc2f9088e68754781d2feae1a59748330", 0x81, r6}, 0x68) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000880)={0x0, 0x71c2, 0x5}) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000008c0), 0x13c000, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x4, &(0x7f0000000900)=0x6, 0x4) r8 = perf_event_open(&(0x7f0000000940)={0x3, 0x80, 0x6, 0x28, 0x2e, 0x7, 0x0, 0x2, 0xa0010, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x2, @perf_config_ext={0x6, 0x8}, 0x1a080, 0x2, 0x0, 0x2, 0x101, 0x8, 0x4080, 0x0, 0x8, 0x0, 0x400}, r5, 0xa, 0xffffffffffffffff, 0x8) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r9, 0x890b, &(0x7f0000000a00)={@local, @private2, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1, 0x1, 0xb15, 0x400, 0x9, 0x900080}) r10 = syz_mount_image$hpfs(&(0x7f0000000a80), &(0x7f0000000ac0)='./file0\x00', 0x8, 0x3, &(0x7f0000001cc0)=[{&(0x7f0000000b00)="4d0bd5d342ed1833ac34356027a6054a044f81185bec3c5b750bf7e703567cf8d81b5197c269caa936a810c4e8a5801c7b9925ff64b545d169212c0c685fcb95b99d2175460325b33278899a4c1efbfde9bc40ca53b74dad7eb25b12973d598454c0aae61ec292d9887e54b53ce17ca67077748152ceaf567555fb01a498a3368dc46701b657606446398fd962a7e09f3b9779d2b0f8cc2dcdf4ccea31873acd133c814f4885302359d1318ca88362016afa80e71b4e731016ec8b4bb672c118926c750c", 0xc4, 0x28}, {&(0x7f0000000c00)="fe5b761d0726aa745a2f3869bdd22a8c58762b5e39378838f07d2e20f21d65fed8e10d10c1ca46880b88aaa326cb0145c54494cc19345636236a4920b0c9097a8e8ce84973d8ee7e5d434fece133494499587fbf4d2e9b7bc959becd5b009da0a282d1f9e3c3cfbebb86bf8fe32530d686d91d340b8f933ebf599d8c5821209e22d7a2da261b85c54a372070dcd9", 0x8e, 0x1}, {&(0x7f0000000cc0)="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", 0x1000, 0xa3b000000000}], 0x1008, &(0x7f0000001d40)={[{'\',(/(!({\xeb{#\\'}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/proc/sys/net/ipv4/vs/lblcr_expiration\x00'}}, {@fowner_lt={'fowner<', 0xee00}}, {@euid_gt={'euid>', 0xee01}}]}) dup2(r10, r6) r11 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r11, 0x2405, r8) 12:14:04 executing program 0: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r0, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000100001040001019f00ddffffff000001", @ANYRES32=r0, @ANYBLOB="0001000000000000240012000c00040062726964676500000c0002f60700050001000000080001"], 0x44}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000000), 0xf, 0x0) [ 321.490916][T17086] loop3: detected capacity change from 0 to 6 [ 321.504474][T17088] loop1: detected capacity change from 0 to 16 [ 321.505366][T17087] usb usb9: usbfs: process 17087 (syz-executor.0) did not claim interface 0 before use [ 321.527787][T17084] loop4: detected capacity change from 0 to 13 [ 321.545888][T17086] FAT-fs (loop3): Directory bread(block 6) failed [ 321.561235][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 321.582925][T17086] FAT-fs (loop3): Directory bread(block 6) failed [ 321.590713][T17095] device gretap0 entered promiscuous mode 12:14:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4602, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x88, 0x0) 12:14:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x3, 0x0) 12:14:04 executing program 4: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xca, 0x61, 0xfa, 0x20, 0xb05, 0x1779, 0x985b, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x1d, 0x0, 0x1, 0x58, 0x45, 0xce, 0x0, [], [{{0x9, 0x5, 0x6}}]}}]}}]}}, 0x0) syz_usb_ep_write(r0, 0xb3, 0xc, &(0x7f0000000040)="c67a57e016909f4dc89e7de3") 12:14:04 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4c00, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 321.774781][T17105] loop1: detected capacity change from 0 to 16 [ 321.811678][T17117] loop3: detected capacity change from 0 to 6 12:14:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf0, 0x0) [ 321.854909][T17117] FAT-fs (loop3): Directory bread(block 6) failed [ 321.879423][T17117] FAT-fs (loop3): Directory bread(block 6) failed 12:14:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4c01, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 321.930479][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4, 0x0) 12:14:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x1, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x3, 0x300) accept4$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, 0x0, 0x0) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x44001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$hwrng(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000240)="0503d03206023e0400a00000c51aa1f049a713f7c25975e697b06d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697fc5c34662a3cc0d9620f85c3e4f110e61d707be45c87df2d0ddaedeaf8a7b87dac97625a67187c0a33385ae65000000000000000000000000000020a94fdb6611", 0xfe4d, 0x0, 0x0, 0x0) 12:14:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x541b, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 322.006826][T17087] usb usb9: usbfs: process 17087 (syz-executor.0) did not claim interface 0 before use 12:14:05 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 322.092721][T17142] loop3: detected capacity change from 0 to 6 [ 322.101935][T17141] loop1: detected capacity change from 0 to 16 [ 322.112188][T17142] FAT-fs (loop3): Directory bread(block 6) failed [ 322.131049][T17142] FAT-fs (loop3): Directory bread(block 6) failed 12:14:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5421, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 322.178514][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x300, 0x0) 12:14:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x1, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x3, 0x300) accept4$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, 0x0, 0x0) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x44001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$hwrng(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000240)="0503d03206023e0400a00000c51aa1f049a713f7c25975e697b06d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697fc5c34662a3cc0d9620f85c3e4f110e61d707be45c87df2d0ddaedeaf8a7b87dac97625a67187c0a33385ae65000000000000000000000000000020a94fdb6611", 0xfe4d, 0x0, 0x0, 0x0) [ 322.273882][T10392] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 322.296377][T17162] loop1: detected capacity change from 0 to 16 [ 322.543221][T10392] usb 5-1: Using ep0 maxpacket: 32 [ 322.674161][T10392] usb 5-1: config 0 has an invalid interface number: 29 but max is 0 [ 322.682279][T10392] usb 5-1: config 0 has no interface number 0 [ 322.710716][T10392] usb 5-1: config 0 interface 29 altsetting 0 endpoint 0x6 has invalid wMaxPacketSize 0 [ 322.745004][T10392] usb 5-1: New USB device found, idVendor=0b05, idProduct=1779, bcdDevice=98.5b [ 322.771804][T10392] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 322.808324][T10392] usb 5-1: config 0 descriptor?? 12:14:06 executing program 4: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xca, 0x61, 0xfa, 0x20, 0xb05, 0x1779, 0x985b, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x1d, 0x0, 0x1, 0x58, 0x45, 0xce, 0x0, [], [{{0x9, 0x5, 0x6}}]}}]}}]}}, 0x0) syz_usb_ep_write(r0, 0xb3, 0xc, &(0x7f0000000040)="c67a57e016909f4dc89e7de3") 12:14:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x5, 0x0) 12:14:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5450, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:06 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x1, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x3, 0x300) accept4$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, 0x0, 0x0) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x1, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x44001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) openat$hwrng(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000240)="0503d03206023e0400a00000c51aa1f049a713f7c25975e697b06d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697fc5c34662a3cc0d9620f85c3e4f110e61d707be45c87df2d0ddaedeaf8a7b87dac97625a67187c0a33385ae65000000000000000000000000000020a94fdb6611", 0xfe4d, 0x0, 0x0, 0x0) 12:14:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x500, 0x0) [ 323.112291][T10392] usb 5-1: USB disconnect, device number 2 [ 323.188943][T17188] loop3: detected capacity change from 0 to 6 [ 323.213997][T17191] loop1: detected capacity change from 0 to 16 [ 323.221671][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:06 executing program 0: syz_emit_ethernet(0x6a, &(0x7f0000000240)={@local, @dev, @void, {@ipv4={0x800, @gre={{0x6, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @private=0xa010100, {[@timestamp={0x44, 0x4, 0x1f, 0x0, 0xf}]}}}}}}, 0x0) syz_emit_ethernet(0x29, &(0x7f00000000c0)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @void, {@llc_tr={0x11, {@snap={0x54, 0xaa, "53f3", "909aba", 0x809b, "d3cfdd7024f274deea8a4768516c37af4f94"}}}}}, &(0x7f0000000100)={0x0, 0x2, [0x3, 0x316, 0x9f9, 0xa26]}) syz_emit_ethernet(0x2d, &(0x7f00000002c0)={@multicast, @empty, @void, {@arp={0x806, @generic={0x205, 0xa01, 0x6, 0x1, 0x9, @broadcast, '\t', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3c}, "6e146daa1d4bed5922e3"}}}}, &(0x7f0000000300)={0x0, 0x1, [0x5df, 0xb60, 0x65, 0x4d0]}) syz_emit_ethernet(0x80, &(0x7f0000000000)={@empty, @local, @val={@void, {0x8100, 0x0, 0x0, 0x2}}, {@llc={0x4, {@snap={0x1, 0xaa, 'n', "827b18", 0xa01, "64d2b4ccff69c275651a3f93c24755fe9db2876eb7ad41577bae94ebcb0f942945d72eb7736d9515f2b57689216c87c3d2de4423895f0966f25a02e0f9e685e308bc6b44745d4ad74163db8b1ea95b01af1ce6342e150b62e0f317228158fe6e7c960dcb78e4"}}}}}, &(0x7f0000000080)={0x0, 0x1, [0x302, 0x828, 0x8be, 0x113]}) syz_emit_ethernet(0xba, &(0x7f0000000140)={@local, @local, @void, {@llc={0x4, {@llc={0xe, 0x0, "75bb", "512597bd135840783b3bc36a3e9d289113a097dcaf371946f4e657aec38ba1976711cc87920e81a72dd76a79db245c4aa14263676b053060f6f460ba7fd2c13a07dd013bf133875d9644d2cb0690512db8b61f77f4b973ea0068ed188c684cfe036342c7ada86eababf5cb6ebdfb58fd20012dead9ac0d918c5177ec12e2cc805717a1aac9373df503fa4a35b7d90a323eb99194a1e27c5a77919243b4ceaa68a179f63886e24aef"}}}}}, &(0x7f0000000200)={0x0, 0x4, [0x976, 0xa54, 0xa31, 0xc7a]}) syz_emit_ethernet(0x113, &(0x7f0000000340)={@multicast, @remote, @void, {@ipx={0x8137, {0xffff, 0x105, 0x20, 0x14, {@current, @random="a606f14581e8", 0x6}, {@current, @random="dcf543fed669", 0x4}, "c1930614b9108dc8b36771ca1f4055616312ffe1bb8953fb30fb021ccbe5f96c6b3230092d8dfc16fb1f67d70035b598645f584d862860b95c1f818c0c49f84e0af3ec2cea73a36920d47b7bb7a1c1119faf1a74d6239bb91952e023aff3a7d1ec58e8b34cee398f3b3fd90167b65628a38350e11a5aefc8af7a4a1eadbaf54d96c82214b32631067c468302975984513f5840b9a3cebef61c517502eb2df513cb570c4dbd1bf4a3f63d9a87626ed288ccfba1de1df36eb89a0d8eefd0669c741c52608c15b773a196881d85b5dedc3e5b24902c7ae7ab47693b4462248bd0d8afe291b394381a"}}}}, &(0x7f0000000480)={0x0, 0x4, [0x1d, 0x4e1, 0xfdf, 0x246]}) [ 323.282963][T17188] FAT-fs (loop3): Directory bread(block 6) failed 12:14:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x600, 0x0) 12:14:06 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5451, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6, 0x0) [ 323.326993][ T37] kauditd_printk_skb: 7 callbacks suppressed [ 323.327007][ T37] audit: type=1804 audit(1630757646.425:178): pid=17200 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/86/bus" dev="sda1" ino=14505 res=1 errno=0 12:14:06 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:06 executing program 0: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 323.442588][T17210] loop1: detected capacity change from 0 to 16 [ 323.460704][T17215] loop3: detected capacity change from 0 to 6 [ 323.516188][ T37] audit: type=1804 audit(1630757646.615:179): pid=17220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/87/bus" dev="sda1" ino=14499 res=1 errno=0 [ 323.520027][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 323.547270][T17215] FAT-fs (loop3): Directory bread(block 6) failed [ 323.622901][ T37] audit: type=1804 audit(1630757646.715:180): pid=17224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir319590105/syzkaller.3DAbyP/50/bus" dev="sda1" ino=14498 res=1 errno=0 [ 323.649170][T10392] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 323.668329][ T37] audit: type=1804 audit(1630757646.725:181): pid=17225 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/87/bus" dev="sda1" ino=14499 res=1 errno=0 [ 323.784562][ T37] audit: type=1804 audit(1630757646.885:182): pid=17235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir319590105/syzkaller.3DAbyP/50/bus" dev="sda1" ino=14498 res=1 errno=0 [ 323.946282][T10392] usb 5-1: Using ep0 maxpacket: 32 [ 324.095276][T10392] usb 5-1: config 0 has an invalid interface number: 29 but max is 0 [ 324.109549][T10392] usb 5-1: config 0 has no interface number 0 [ 324.120128][T10392] usb 5-1: config 0 interface 29 altsetting 0 endpoint 0x6 has invalid wMaxPacketSize 0 [ 324.131264][T10392] usb 5-1: New USB device found, idVendor=0b05, idProduct=1779, bcdDevice=98.5b [ 324.143052][T10392] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 324.166393][T10392] usb 5-1: config 0 descriptor?? 12:14:07 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) prlimit64(r0, 0xe, &(0x7f00000000c0)={0xbd6c, 0x4}, &(0x7f0000000300)) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') writev(r2, 0x0, 0x0) ioctl$KDSETKEYCODE(r6, 0x4b4d, 0x0) preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x4000000, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000006e677265737300000000000000"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\b\x00', @ANYRES32=r5, @ANYBLOB="00000000000000000c0000000800010075333200200002001400"], 0x4c}}, 0x0) 12:14:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5452, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x700, 0x0) 12:14:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7, 0x0) 12:14:07 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:07 executing program 0: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 324.513124][T10454] usb 5-1: USB disconnect, device number 3 [ 324.567369][T17251] loop3: detected capacity change from 0 to 6 [ 324.576577][T17254] loop1: detected capacity change from 0 to 16 [ 324.579748][T17251] FAT-fs (loop3): Directory bread(block 6) failed [ 324.597503][T17251] FAT-fs (loop3): Directory bread(block 6) failed 12:14:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5460, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 324.619833][ T37] audit: type=1804 audit(1630757647.715:183): pid=17255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/88/bus" dev="sda1" ino=14518 res=1 errno=0 [ 324.623431][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x900, 0x0) 12:14:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe, 0x0) [ 324.736551][T17265] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 324.744160][ T37] audit: type=1804 audit(1630757647.775:184): pid=17256 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir319590105/syzkaller.3DAbyP/51/bus" dev="sda1" ino=14514 res=1 errno=0 12:14:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5501, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:07 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 324.870072][T17269] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 324.880895][T17288] loop3: detected capacity change from 0 to 6 [ 324.884275][ T37] audit: type=1804 audit(1630757647.875:185): pid=17255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/88/bus" dev="sda1" ino=14518 res=1 errno=0 [ 324.913650][T17265] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 324.926095][T17288] FAT-fs (loop3): Directory bread(block 6) failed [ 324.937358][T17288] FAT-fs (loop3): Directory bread(block 6) failed 12:14:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf, 0x0) [ 324.948329][ T37] audit: type=1804 audit(1630757647.955:186): pid=17279 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir319590105/syzkaller.3DAbyP/51/bus" dev="sda1" ino=14514 res=1 errno=0 [ 324.959484][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 324.991304][ T37] audit: type=1804 audit(1630757648.055:187): pid=17293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/89/bus" dev="sda1" ino=14526 res=1 errno=0 [ 325.014198][T17298] loop1: detected capacity change from 0 to 16 [ 325.077255][T17306] loop3: detected capacity change from 0 to 6 [ 325.087328][T17306] FAT-fs (loop3): Directory bread(block 6) failed [ 325.096835][T17306] FAT-fs (loop3): Directory bread(block 6) failed [ 325.514518][T17317] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 325.537975][T17317] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 12:14:08 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) prlimit64(r0, 0xe, &(0x7f00000000c0)={0xbd6c, 0x4}, &(0x7f0000000300)) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') writev(r2, 0x0, 0x0) ioctl$KDSETKEYCODE(r6, 0x4b4d, 0x0) preadv(r6, &(0x7f0000000480), 0x10000000000002a1, 0x4000000, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000006e677265737300000000000000"], 0x30}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB='L\x00\x00\x00,\x00\'\r\b\x00', @ANYRES32=r5, @ANYBLOB="00000000000000000c0000000800010075333200200002001400"], 0x4c}}, 0x0) 12:14:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x550b, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x10, 0x0) 12:14:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xa00, 0x0) 12:14:08 executing program 0: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 325.650203][T17323] loop1: detected capacity change from 0 to 16 [ 325.653032][T17324] loop3: detected capacity change from 0 to 6 [ 325.675231][T17324] FAT-fs (loop3): Directory bread(block 6) failed [ 325.694100][T17324] FAT-fs (loop3): Directory bread(block 6) failed 12:14:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5514, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xc00, 0x0) 12:14:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x13, 0x0) 12:14:08 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0x0, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 325.752320][T17337] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 12:14:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x551f, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5521, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 325.878490][T17362] loop3: detected capacity change from 0 to 6 [ 325.880051][T17361] loop1: detected capacity change from 0 to 16 [ 325.899488][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 325.921009][T17362] FAT-fs (loop3): Directory bread(block 6) failed 12:14:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xd00, 0x0) [ 325.956515][T17362] FAT-fs (loop3): Directory bread(block 6) failed [ 326.016138][T17337] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 326.031227][T17337] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 326.063094][T17380] loop1: detected capacity change from 0 to 16 12:14:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="687567653d616c776179731ab7cc60d9352b5a6b87bf1945c8311939c7388bcf4a88011a1fad3f26c7ab9ae8b8e2724861e09a9484000000003cf81e"]) chdir(&(0x7f0000000380)='./bus\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x5, 0x4003012, r2, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x0, 0x4, 0x49, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0xc81, 0x5, 0xfff, 0x5, 0x0, 0xfffff80e, 0x53, 0x0, 0x0, 0x0, 0x1ff}, r3, 0x0, 0xffffffffffffffff, 0x3) close(r1) 12:14:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x48, 0x0) 12:14:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5522, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:09 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe00, 0x0) 12:14:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xd00, 0x0) 12:14:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x5523, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 326.552698][T17396] loop3: detected capacity change from 0 to 6 [ 326.569951][T17400] loop1: detected capacity change from 0 to 16 [ 326.580187][T17405] loop0: detected capacity change from 0 to 16 [ 326.590977][T17402] tmpfs: Bad value for 'huge' [ 326.594053][T17396] FAT-fs (loop3): Directory bread(block 6) failed [ 326.619081][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 326.619111][T17396] FAT-fs (loop3): Directory bread(block 6) failed 12:14:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf00, 0x0) 12:14:09 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="2d630000000000000000b205000008000300", @ANYRES32=r2, @ANYBLOB="a77d2cb7cfe6be13411a7e5da8f6d494503f2028a167a467e11a57cb7865116a2976c5d424c2003c25a698d003ba638ce6e2902db5ed78fecb89d63100ad9830952d22075bea84"], 0x1c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0x120, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0xf0, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xe0, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0xa1ae}}]}, @IFLA_VLAN_EGRESS_QOS={0x64, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2be5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x80000000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x3000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x2ed8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0xffff}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xad4c, 0x4}}]}]}}}, @IFLA_LINK={0x8}, @IFLA_NET_NS_PID={0x8}]}, 0x120}}, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x949e7c938ea59ce8}, 0x200000c4) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r5}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x2d000000, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38b89cd8a3eefb785c2805627513a62b34aca4070a497cb59026a94fe884c4f218e433a56fe8bc4466cd3b91ec810b6349f4874f34eb851dab010435d4be011cc0d2aaf80a732b18851b9c7812bb0000000000", @ANYRES32=0x0, @ANYBLOB="b84202000a2a04000801128009000100766c616e00000000f80002800600010000000000880004800c000100040020001f0000001800010007000000010001000c000100fc030000e43900000c00010008000000090000000c000100ff070000730c00000c000100e7d10000050000000c000100a3ca0000010000000c00010008000000fcffffff0c00010008000000aea100000c00010009000000050000000c0001000600000005000000640003800c00010009000000e52b00000c00010000000000080000000c00010009000000000000800c00010002000000080000000c00010005000000003000000c00010005000000d92e00000c000100010000000a0000000c0001004cad00000400000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB], 0x138}}, 0x0) 12:14:09 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x6364, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4c, 0x0) [ 326.846050][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 326.847472][T17402] tmpfs: Bad value for 'huge' [ 326.874754][T17433] loop3: detected capacity change from 0 to 6 12:14:10 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xff6, 0x0) 12:14:10 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0x6e) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="000000002c18ec2b0d5968a759eb37338b39633696fd6dad5d3a29cf9c823699afd3b2bf6b2c0e8b3dfd5a892d561c2d9ae5fbef23773e462a245e6eb51650caee7538467c06d47965f5c07a8566b87f83ba926d046ecf1dcd556c655d1dd649a8f013ce390600fb5a17b1585ea50fa84700929d73767bacbfbdb3a666e3a32bca181ae93ed4471592edf59c4b49a08df0563e7f9d3edf724a95e0a79ff4937c9777746b09a922468c5b3f38322c0e0f439c50e17a3254c1dfdd371cd11f0b8e8d929306c3e0044255af2169bab0a30347cf4929fa8a3c3e33e5de10b1", @ANYRES16=r3, @ANYBLOB="0d3a00000000000000003100000008000100000000000c0099000100000000000000"], 0x28}}, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000540)=""/247) ioctl$PPPIOCSMRU1(r5, 0x4020744f, &(0x7f0000000080)) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r6, r2, 0x0, 0x100000002) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 12:14:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8913, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:10 executing program 4: fsmount(0xffffffffffffffff, 0x1, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x3, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r2, 0x10003) r3 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@multicast2, @in=@multicast2, 0x4e23, 0x0, 0x4e20, 0x1000, 0xa, 0x0, 0x0, 0x89}, {0x6e4da5eb, 0xfff, 0x9, 0x3, 0xf9, 0x8, 0x7, 0x6}, {0x10000, 0x0, 0x0, 0xffff}, 0xfffffff8, 0x6e6bb4, 0x0, 0x0, 0x3}, {{@in=@remote, 0x4d6, 0x6c}, 0xa, @in6=@dev={0xfe, 0x80, '\x00', 0x35}, 0x0, 0x4, 0x3, 0x81, 0x6, 0xa, 0xeb}}, 0x22) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x2000000, @ipv4={'\x00', '\xff\xff', @multicast2}, 0xfffffffd}, @in6={0xa, 0x4e22, 0x0, @mcast2, 0xd3}], 0x38) fcntl$setown(r1, 0x8, r4) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], 0x48) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000003c0)={0x0, 0x0, "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", "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"}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x6, 0x0, 0x7, 0x8}, {0x4, 0x43, 0x9, 0x46fdb22}, {0x20, 0x80, 0x0, 0x5}, {0x7f, 0x0, 0x4, 0x7}]}, 0x10) write$binfmt_elf64(r0, &(0x7f0000001600)=ANY=[@ANYBLOB="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"], 0x41e) [ 326.898876][T17433] FAT-fs (loop3): Directory bread(block 6) failed [ 326.925916][T17433] FAT-fs (loop3): Directory bread(block 6) failed 12:14:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x60, 0x0) 12:14:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1100, 0x0) [ 326.973829][T17442] loop1: detected capacity change from 0 to 16 [ 327.012331][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:10 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8914, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:10 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendto$packet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000058e5500"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="7865fed64ac7110100"/20, @ANYRES32=r8, @ANYBLOB="062d000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r6}, @IFLA_HSR_SLAVE2={0x8, 0x2, r8}]}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x48}}, 0x0) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 12:14:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8918, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 327.122233][T17464] loop3: detected capacity change from 0 to 6 [ 327.131373][T17465] loop1: detected capacity change from 0 to 16 [ 327.155772][T17464] FAT-fs (loop3): Directory bread(block 6) failed 12:14:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1300, 0x0) [ 327.185502][T17475] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 327.190661][T17464] FAT-fs (loop3): Directory bread(block 6) failed 12:14:10 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x68, 0x0) [ 327.290380][T17511] loop1: detected capacity change from 0 to 16 [ 327.378445][T17520] loop3: detected capacity change from 0 to 6 [ 327.407675][T17520] FAT-fs (loop3): Directory bread(block 6) failed [ 327.418085][T17520] FAT-fs (loop3): Directory bread(block 6) failed 12:14:10 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x48040200) unshare(0x8010000) pipe(0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x13c, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x3, 0x0, 0xf201}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-256-x86\x00'}, 0x58) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 12:14:10 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8933, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:10 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x5eb040, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r5, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) bind$unix(r5, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) recvfrom$unix(r4, &(0x7f0000000080)=""/13, 0xd, 0x2100, &(0x7f0000000180)=@file={0x1, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r6 = open(&(0x7f0000000100)='./bus\x00', 0x6e842, 0x0) pwritev2(r6, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x300000}], 0x1, 0x4200, 0x0, 0x3) 12:14:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1800, 0x0) 12:14:10 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6c, 0x0) [ 327.767699][T17561] loop3: detected capacity change from 0 to 6 [ 327.771602][T17566] loop1: detected capacity change from 0 to 16 12:14:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8946, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 328.063911][T17561] FAT-fs (loop3): Directory bread(block 6) failed 12:14:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x74, 0x0) 12:14:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1f00, 0x0) 12:14:11 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8983, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x400448c9, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 328.287810][T17574] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 328.426574][T17574] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 328.437429][T17602] loop3: detected capacity change from 0 to 6 [ 328.443083][T17603] loop1: detected capacity change from 0 to 16 [ 328.458193][T17602] FAT-fs (loop3): Directory bread(block 6) failed [ 328.494172][T17574] device gretap0 left promiscuous mode [ 328.501037][T17602] FAT-fs (loop3): Directory bread(block 6) failed [ 328.507152][T17574] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 328.516628][T17574] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 328.536013][T17574] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 328.629282][ T37] kauditd_printk_skb: 18 callbacks suppressed [ 328.629299][ T37] audit: type=1800 audit(1630757651.725:206): pid=17630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14535 res=0 errno=0 [ 328.705071][T17577] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 328.836149][T17577] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 328.856267][T17577] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 12:14:12 executing program 0: perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x48040200) unshare(0x8010000) pipe(0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x13c, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x3, 0x0, 0xf201}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'hash\x00', 0x0, 0x0, 'blake2s-256-x86\x00'}, 0x58) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 12:14:12 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x2000, 0x0) 12:14:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x400448dd, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7a, 0x0) 12:14:12 executing program 4: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x5eb040, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r5, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) bind$unix(r5, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) recvfrom$unix(r4, &(0x7f0000000080)=""/13, 0xd, 0x2100, &(0x7f0000000180)=@file={0x1, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r6 = open(&(0x7f0000000100)='./bus\x00', 0x6e842, 0x0) pwritev2(r6, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x300000}], 0x1, 0x4200, 0x0, 0x3) [ 329.032821][T17663] loop1: detected capacity change from 0 to 16 [ 329.049299][ T37] audit: type=1804 audit(1630757652.145:207): pid=17662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/98/bus" dev="sda1" ino=14550 res=1 errno=0 12:14:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x3f00, 0x0) [ 329.077316][T17666] loop3: detected capacity change from 0 to 6 12:14:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x400454ca, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 329.122143][T17666] FAT-fs (loop3): Directory bread(block 6) failed 12:14:12 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 329.402309][T17681] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 329.422208][ T37] audit: type=1800 audit(1630757652.295:208): pid=17684 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14536 res=0 errno=0 [ 329.459004][T17689] FAT-fs (loop3): Directory bread(block 6) failed [ 329.508230][T17700] loop1: detected capacity change from 0 to 16 12:14:12 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf0, 0x0) [ 329.535334][ T37] audit: type=1804 audit(1630757652.635:209): pid=17697 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/99/bus" dev="sda1" ino=14550 res=1 errno=0 12:14:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4004550c, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 329.620382][T17681] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 329.657914][T17681] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 329.705681][ T37] audit: type=1804 audit(1630757652.805:210): pid=17707 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/100/bus" dev="sda1" ino=14539 res=1 errno=0 [ 329.754741][T17714] loop3: detected capacity change from 0 to 6 [ 329.801442][T17714] FAT-fs (loop3): Directory bread(block 6) failed [ 329.837499][T17714] FAT-fs (loop3): Directory bread(block 6) failed 12:14:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1800, 0x0) 12:14:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4000, 0x0) 12:14:13 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1800, 0x0) 12:14:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x300, 0x0) [ 330.104163][T17738] loop4: detected capacity change from 0 to 16 [ 330.116751][ T37] audit: type=1804 audit(1630757653.215:211): pid=17737 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/101/bus" dev="sda1" ino=14549 res=1 errno=0 [ 330.133724][T17743] loop1: detected capacity change from 0 to 16 [ 330.144593][T17740] loop3: detected capacity change from 0 to 6 12:14:13 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040), 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 330.161728][T17745] loop0: detected capacity change from 0 to 16 12:14:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6c, 0x0) 12:14:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x500, 0x0) 12:14:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') readlink(&(0x7f00000001c0)='./bus/file1\x00', &(0x7f0000000540)=""/112, 0x70) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000003c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000280), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f00000006c0)='./bus\x00') mkdir(&(0x7f0000000500)='./bus\x00', 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40042406, 0x0) [ 330.216932][T17740] FAT-fs (loop3): Directory bread(block 6) failed 12:14:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6000, 0x0) [ 330.292142][T17757] loop4: detected capacity change from 0 to 6 [ 330.335101][ T37] audit: type=1804 audit(1630757653.435:212): pid=17759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/102/bus" dev="sda1" ino=14549 res=1 errno=0 [ 330.342138][T17757] FAT-fs (loop4): Directory bread(block 6) failed [ 330.364294][T17765] loop0: detected capacity change from 0 to 4096 12:14:13 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 330.392595][T17772] loop3: detected capacity change from 0 to 6 [ 330.408708][T17774] loop1: detected capacity change from 0 to 16 [ 330.437032][T17765] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 330.461994][T17772] FAT-fs (loop3): Directory bread(block 6) failed 12:14:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4004550d, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x8800, 0x0) 12:14:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x600, 0x0) [ 330.570846][ T37] audit: type=1804 audit(1630757653.665:213): pid=17789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/103/bus" dev="sda1" ino=14543 res=1 errno=0 [ 330.608689][T17780] overlayfs: failed to resolve './file0': -2 12:14:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prlimit64(0x0, 0x8, &(0x7f0000000880), 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x169900, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x1f, 0x2, 0x3f, 0x6, 0x0, 0x7, 0x8400, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0x3}, 0x80, 0x67e, 0x6, 0x0, 0x8001, 0xfff00000, 0x1, 0x0, 0x94, 0x0, 0x8}, 0xffffffffffffffff, 0xb, r0, 0x12) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:14:13 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 330.629625][T17796] loop1: detected capacity change from 0 to 16 [ 330.648127][T17780] overlayfs: overlapping lowerdir path 12:14:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4004551e, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 330.689433][T17800] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 330.699891][ T37] audit: type=1804 audit(1630757653.795:214): pid=17806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/104/bus" dev="sda1" ino=14561 res=1 errno=0 12:14:13 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x40045564, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:13 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f0000000040)) mmap$dsp(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x13, r0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f0000000080)) ioctl$SNDCTL_DSP_POST(r0, 0x5008, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x8010500c, &(0x7f0000000000)) 12:14:13 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf000, 0x0) [ 330.769672][T17809] loop3: detected capacity change from 0 to 6 [ 330.806125][T17809] FAT-fs (loop3): Directory bread(block 6) failed [ 330.830292][T17822] FAT-fs (loop3): Directory bread(block 6) failed 12:14:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x700, 0x0) 12:14:14 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) eventfd(0x8) r1 = syz_io_uring_setup(0x187, &(0x7f0000000180), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140), 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="3400000029002908ef0ab36c000000000400000008000c"], 0x34}, 0x1, 0xffffff7f0e000000}, 0x0) syz_io_uring_setup(0x87, &(0x7f0000000240), &(0x7f0000ee9000/0x2000)=nil, &(0x7f00006d6000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r6 = socket(0x10, 0x803, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x6, 0x0, r6, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0}}, 0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x64}, 0x3) syz_io_uring_setup(0x3177, &(0x7f00000002c0)={0x0, 0xbbed, 0x20, 0x0, 0x381, 0x0, r1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00006db000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000380)) 12:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x40045567, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 330.935599][T17830] loop1: detected capacity change from 0 to 16 12:14:14 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 330.968057][ T37] audit: type=1804 audit(1630757654.065:215): pid=17832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/105/bus" dev="sda1" ino=13938 res=1 errno=0 [ 330.983737][T17837] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 331.019127][T17840] loop3: detected capacity change from 0 to 6 [ 331.031121][T17840] FAT-fs (loop3): Directory bread(block 6) failed 12:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4004556a, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf60f, 0x0) 12:14:14 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 331.073337][T17840] FAT-fs (loop3): Directory bread(block 6) failed 12:14:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe00, 0x0) [ 331.155797][T17852] usb usb9: usbfs: process 17852 (syz-executor.0) did not claim interface 0 before use [ 331.184783][T17857] loop1: detected capacity change from 0 to 16 [ 331.219054][T17873] usb usb9: usbfs: process 17873 (syz-executor.0) did not claim interface 0 before use 12:14:14 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f0000001100)={0x1, 0x80, 0x0, 0x91, 0x9, 0x80, 0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000010c0)}, 0x4004, 0x7a, 0x9, 0x7, 0xffff, 0x81, 0x3, 0x0, 0x9f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r0 = perf_event_open(0x0, 0x0, 0xfffffffffffffff8, 0xffffffffffffffff, 0x2) shmget$private(0x0, 0x3000, 0x0, &(0x7f00002b3000/0x3000)=nil) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)) timer_settime(0x0, 0x1, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000d00)=ANY=[@ANYRESHEX, @ANYRES64=r1, @ANYBLOB="2db1720248", @ANYBLOB=',group_id=', @ANYRES16]) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000140)={{r2, r3+10000000}}, &(0x7f00000001c0)) timer_create(0x5, &(0x7f0000001200)={0x0, 0x20, 0x2}, &(0x7f0000001240)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(0x0, 0x0, 0x4, r0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000012c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000001a80)="b9ff0300600d698cb89e14f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 12:14:14 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) eventfd(0x8) r1 = syz_io_uring_setup(0x187, &(0x7f0000000180), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140), 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="3400000029002908ef0ab36c000000000400000008000c"], 0x34}, 0x1, 0xffffff7f0e000000}, 0x0) syz_io_uring_setup(0x87, &(0x7f0000000240), &(0x7f0000ee9000/0x2000)=nil, &(0x7f00006d6000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r6 = socket(0x10, 0x803, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x6, 0x0, r6, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0}}, 0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x64}, 0x3) syz_io_uring_setup(0x3177, &(0x7f00000002c0)={0x0, 0xbbed, 0x20, 0x0, 0x381, 0x0, r1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00006db000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000380)) 12:14:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xff00, 0x0) 12:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x40049409, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 331.333259][T17878] loop3: detected capacity change from 0 to 6 12:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x40082404, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 331.377887][T17878] FAT-fs (loop3): Directory bread(block 6) failed [ 331.404714][T17894] loop1: detected capacity change from 0 to 16 [ 331.409176][T17893] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 331.420516][T17897] FAT-fs (loop3): Directory bread(block 6) failed 12:14:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf00, 0x0) 12:14:14 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xff0f, 0x0) 12:14:14 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) eventfd(0x8) r1 = syz_io_uring_setup(0x187, &(0x7f0000000180), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x40, &(0x7f0000000140), 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="3400000029002908ef0ab36c000000000400000008000c"], 0x34}, 0x1, 0xffffff7f0e000000}, 0x0) syz_io_uring_setup(0x87, &(0x7f0000000240), &(0x7f0000ee9000/0x2000)=nil, &(0x7f00006d6000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r6 = socket(0x10, 0x803, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x6, 0x0, r6, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0}}, 0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x64}, 0x3) syz_io_uring_setup(0x3177, &(0x7f00000002c0)={0x0, 0xbbed, 0x20, 0x0, 0x381, 0x0, r1}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00006db000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000380)) 12:14:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4008550c, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:14 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 331.606098][T17908] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 331.607080][T17919] loop3: detected capacity change from 0 to 6 [ 331.626359][T17921] loop1: detected capacity change from 0 to 16 12:14:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) splice(r0, &(0x7f00000000c0)=0x7ff, r1, &(0x7f0000000140)=0x7, 0x1, 0x8) write(r0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x9}, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="3900000013001104680907000000000f0000ff3f04000000170a001700000000040037000a00030014917c82aa75b9a64411f6a4ee1ee438d2", 0x39}], 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='wchan\x00') ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000200)=@usbdevfs_disconnect={0xe9}) [ 331.685621][T17919] FAT-fs (loop3): Directory bread(block 6) failed 12:14:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1517f, 0x0) 12:14:14 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x1f, 0xff, 0x3f, 0x20, 0x0, 0x7, 0x80, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x79, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}, 0x44, 0x9, 0x4, 0x8, 0xfffffffffffffffb, 0x4, 0x8, 0x0, 0x4, 0x0, 0x6}, 0xffffffffffffffff, 0xc, r0, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') perf_event_open(0x0, 0x0, 0x3, r1, 0x2) ioctl$DRM_IOCTL_MODE_SETPROPERTY(r1, 0xc01064ab, &(0x7f0000000180)={0x8000, 0x6, 0x4}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') ioctl$VT_RELDISP(r2, 0x5605) r3 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000380)={[{@fat=@nfs}]}) mkdirat(r3, &(0x7f0000000080)='./file0\x00', 0x76) r4 = open(&(0x7f00000002c0)='./file0\x00', 0x10800, 0x1) lseek(0xffffffffffffffff, 0xb8, 0x4) unlinkat(r4, &(0x7f0000000200)='./file0\x00', 0x200) mount(&(0x7f0000000680)=ANY=[], 0x0, &(0x7f0000000400)='vxfs\x00', 0x50083, 0x0) socket(0x10, 0x0, 0x0) 12:14:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1300, 0x0) 12:14:14 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 331.776235][T17945] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 331.816987][T17945] device gretap0 entered promiscuous mode [ 331.833844][T17950] usb usb9: usbfs: process 17950 (syz-executor.4) did not claim interface 0 before use [ 331.856870][T17955] loop1: detected capacity change from 0 to 16 [ 331.872987][T17953] loop0: detected capacity change from 0 to 264192 [ 331.880081][T17958] loop3: detected capacity change from 0 to 6 [ 331.911442][T17958] FAT-fs (loop3): Directory bread(block 6) failed 12:14:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x20000, 0x0) 12:14:15 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 331.928580][T17953] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 331.972965][T17967] FAT-fs (loop3): Directory bread(block 6) failed 12:14:15 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)='$\x00\x00\x00R\x00', 0x6) getpeername(r0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f0000000080)=0x80) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x1}, &(0x7f00000001c0)=0x8) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = socket$inet6(0x10, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) splice(r0, 0x0, r3, 0x0, 0x8000000004ffe0, 0x0) 12:14:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1444, 0x0) [ 332.024548][T17973] loop1: detected capacity change from 0 to 16 12:14:15 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 332.164913][T17950] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 332.174770][ T325] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 332.177791][T17950] |u: renamed from gretap0 [ 332.197153][T17950] device |u left promiscuous mode [ 332.222003][T17950] A link change request failed with some changes committed already. Interface |u may have been left with an inconsistent configuration, please check. [ 332.224993][T17982] loop3: detected capacity change from 0 to 6 [ 332.268381][T17982] FAT-fs (loop3): Directory bread(block 6) failed [ 332.276193][T17945] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 332.289054][T17950] usb usb9: usbfs: process 17950 (syz-executor.4) did not claim interface 0 before use [ 332.301601][T17982] FAT-fs (loop3): Directory bread(block 6) failed [ 332.308188][T17945] device |u entered promiscuous mode 12:14:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4008550d, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe0000, 0x0) 12:14:15 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x100000, 0x0) 12:14:15 executing program 4: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) splice(r0, &(0x7f00000000c0)=0x1, r2, &(0x7f0000000180)=0x2, 0xfffffffffffffff8, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x6, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7) timer_settime(0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 12:14:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1f00, 0x0) [ 332.485228][T18004] loop1: detected capacity change from 0 to 16 [ 332.492160][T17962] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.4'. [ 332.503375][T17962] device |u left promiscuous mode [ 332.514827][T17962] A link change request failed with some changes committed already. Interface |u may have been left with an inconsistent configuration, please check. 12:14:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x40085511, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:15 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 332.662778][T18019] loop3: detected capacity change from 0 to 6 [ 332.683358][T18023] loop1: detected capacity change from 0 to 16 [ 332.720221][T18019] FAT-fs (loop3): Directory bread(block 6) failed 12:14:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x200000, 0x0) [ 332.865572][T18056] loop1: detected capacity change from 0 to 16 12:14:16 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x100, &(0x7f00000000c0)="5531487b74aad897fb392299a1183ff89b3a97ee68f7667d6e82c3fd1d1274f0d67e6de74816ff", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000005c0)="abb5bf95b013e6cbc41808cf14d2a8a304844af9b3d421d462583075eecf0eb67537d0c736a2cf8a1dbb15c9d5688fa993382b495fcb8e8d3dd263d44a928a98c0475b5b234a189ccef19cbfe5a2b12c67aa731c58d6d03494c181f787ed07a35387829baf4af583e98504cbed32c342606008c6414803dd12c8d4a63872bae6878c10d1a55630c0dfc0f7952162a75e379d6c2f4ce2297b46da1d7bae571f8a62e11bee46d39681c000da5c91d87768550beb7e8d8c39156f") exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x27, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e", 0x76, 0x400}, {&(0x7f0000010100)="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"/288, 0x120}, {&(0x7f0000010300)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34)', 0x8d, 0xa80}, {0x0}, {&(0x7f0000010800)="000000000000000000000000000000000000000000000000000000001c0000006a706700000000006769660000000000706e670000000000617669000000000064697678000000006d703400000000006d703300000000003367700000000000776d760000000000776d6100000000006d706567000000006d6b7600000000006d6f76000000000061737800000000006173660000000000776d78000000000073766900000000007776780000000000776d0000", 0xb4}, {&(0x7f0000010a00)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binutils for Debian) 2.34) #1 SMP Debian 5.7.10-1rodete2 (2020-08-12 > 201', 0xbd, 0x1a80}, {&(0x7f0000010b00)='\x00\x00\x00\x00Linux version 5.7.10-1rodete2-amd64 (glinux-team@google.com) (gcc version 9.3.0 (Debian 9.3.0-12), GNU ld (GNU Binut', 0x78, 0x1b80}, {&(0x7f0000010c00)="00000000780100"/32, 0x20, 0x1c80}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f0000", 0xa8, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb0000030000000003000000003e00"/64, 0x40, 0x200fe0}, {&(0x7f0000011000)="000000000000000000000000000000000000000000000000000000060000000000000800"/60, 0x3c, 0x2011e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510", 0x1b, 0x201320}, {&(0x7f0000011500)="00000017000000", 0x7}, {&(0x7f0000011600)="0000000000000000000000000000000000000000000003000000000000030000", 0x20, 0x2013e0}, {&(0x7f0000011800)}, {&(0x7f0000011900), 0x0, 0x202fe0}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000000000000000001000000", 0x1f}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f000000000000", 0xcc, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {&(0x7f0000011d00), 0x0, 0x3ff000}, {&(0x7f0000011f00), 0x0, 0x400000}, {0x0, 0x0, 0x4011e0}, {0x0}, {0x0}, {&(0x7f0000012700)}, {0x0}, {&(0x7f0000012900), 0x0, 0x402e00}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000013a00), 0x0, 0x3c00fe0}, {0x0}, {&(0x7f0000014200)}, {0x0, 0x0, 0x3c05fe0}, {0x0, 0x0, 0x3e01000}, {&(0x7f0000014700)}], 0x0, &(0x7f0000014b00)) 12:14:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x40086602, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x2000, 0x0) 12:14:16 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x400000, 0x0) [ 333.218827][T18076] loop1: detected capacity change from 0 to 16 [ 333.219150][T18077] loop3: detected capacity change from 0 to 6 12:14:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4010942a, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 333.275917][T18082] loop0: detected capacity change from 0 to 264192 [ 333.311888][T18077] FAT-fs (loop3): Directory bread(block 6) failed 12:14:16 executing program 4: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000000)) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) splice(r0, &(0x7f00000000c0)=0x1, r2, &(0x7f0000000180)=0x2, 0xfffffffffffffff8, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x6, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7) timer_settime(0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 12:14:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x600000, 0x0) 12:14:16 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4000, 0x0) 12:14:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x40186366, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000c000000dff4ef821ec34de5a68f275e28ea4831010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000012400)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000340)=ANY=[]) rmdir(&(0x7f0000000040)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x1f0, 0x20, 0x400, 0x70bd2a, 0x25dfdbff, {0xe}, [@generic="dff655cc34ab76465f397b1718a869b3f3fb880a7643fe79426439754d15fc07aa106f65d90a8990c4defbe4344999309c05b8535f7896ca4f44d5cbafd0f038ffbb3693d8fb8931af45a52669d846f3eb43885e40d848c577b226fdc9463f3f91297ed403413819f4099d72dc2bcda339807e08136b24a6ba689e748c8304f93cb981655f6760ce2bc391b061daa3e7ddcd733ca3bbeb44e4f21b4f1e476bd0aefaa804831e6ad6055076626f54639b786e5c5bada8360282b7f2", @nested={0xfd, 0x5, 0x0, 0x1, [@generic="a4a7db5945a8e888cd354c944a0b21fbfce89d9573eb23a6f8e0e7ef01c842486a828755cd349ad40be3cf1419878efcb9a939a6bada5c45c98ef0096e25b619af91f4d9dfa2b3f622d23d8b443920c79b3a7168fe0138d7e937c02aafffe4bfce9cac3683bbef2497f43c9fd4396597c981b6e5db8425ebd09e78c45ae99cdbec41a3e73f0fee49710977f756712ac76481982db428ea66f65967db1a07cc28215ec4d93b7c6683f2f4fe27d991bace055121c41d6f1b802f51ee3233522ae8cd7dd72f576d8243f93cca03f02435ea851be4f599f9400b6edb12262c", @typed={0xc, 0x55, 0x0, 0x0, @u64=0x9}, @typed={0x8, 0x47, 0x0, 0x0, @u32=0x9ab}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @typed={0x4, 0x66}, @nested={0x1c, 0x61, 0x0, 0x1, [@typed={0x6, 0x22, 0x0, 0x0, @str='/\x00'}, @typed={0x8, 0x4a, 0x0, 0x0, @uid=r0}, @typed={0x5, 0x18, 0x0, 0x0, @str='\x00'}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x20000800}, 0x80) [ 333.950939][T18131] loop0: detected capacity change from 0 to 1024 [ 333.967218][T18135] loop1: detected capacity change from 0 to 16 [ 333.975066][T18134] loop3: detected capacity change from 0 to 6 [ 333.988519][ T37] kauditd_printk_skb: 12 callbacks suppressed 12:14:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x401c5820, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 333.988532][ T37] audit: type=1804 audit(1630757657.085:228): pid=18132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/117/bus" dev="sda1" ino=14598 res=1 errno=0 [ 334.032080][T18134] FAT-fs (loop3): Directory bread(block 6) failed 12:14:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7fffff, 0x0) 12:14:17 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x80ffff, 0x0) [ 334.120572][T18131] EXT4-fs error (device loop0): ext4_orphan_get:1419: comm syz-executor.0: bad orphan inode 12 12:14:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4414, 0x0) 12:14:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x880000, 0x0) [ 334.187490][T18131] ext4_test_bit(bit=11, block=4) = 0 [ 334.194598][T18131] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 334.288950][T18131] loop0: detected capacity change from 0 to 1024 [ 334.317431][T18131] EXT4-fs (loop0): Unrecognized mount option "+ͣ9~k$ht0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000002c0)={r3}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000012c0)={0x0, r3, "6da0dc72ab17aa43a9c954794b6341e1b0792ab5c48895b60bd1b7e62859be59b129d802000000f5c553e7b77830ba51f889a8f90110dba57bf54ef8f750d6f690af66a163d3385f189be91b48276addf7d24f1c6a0c80727d060028ac5eacaa9fb2db65003bb2d8f3fce42b5158a9bec061f234d7d58ac7457563a5b01d8cdf727665ffb3c651de92ae7bb29b68578b1fbe9206e4a41f37bd2a0f9b2daa8d1b97933f04c5833132065fa97d0b9d6f3f9f23de4afdb2d30657cc146acd1e6b250cd59e84e769f09c837784059f60b730935b8870e8d708161eb4e374162f7a785c4ed9c2bef349a2228200", "247e3ee3871989e9f58239813fe99b019d16c75866984ba3b50da746046d15db0f7a5b1590c5f1ead7153b9bafebcbaf5badd633938cf0124176022071c5ac6e9043e96e58672384f0db2675aa4b86f8ee13e92f45649ee60125723f75d8474ebc61798a904e1515648dea491b986233111f0bcfb161f52c53330fadc932aea16b5189667500427bc7b4a3a4937cc8870884b16e3d4e78364fabf17b055a0716792d53b92e8b028676462a284e96425c5b5759e00b3022fc00f77de3b375299adc54f3ff8a252901c6c04fde707c66debc5ef8ede8f6199e13ecb329e171e6f243874dca3cc098199f3d5c4b8c129a25456828fdd244fd107069af4e44b1b09c165c117b3b5435009757514af49d9b54e6e32aeca20400c64ebf5cd7e6b1316cc3d57beadb542131963c1767fd13862e1d1a0d74399332f698c066b66ae75f5fa7c66ffd0fff97da682a73abf42e213e723a9ed2d3fde5ce1968e40fe34ad4f8a305bd2dd80fb91832646753efef02fd1244f730966105fc3ebd4c43fa4571ab4789f300940548ad9c83ee60a652daa7d7cb83076785dbe7f6bc029c9ce452bf17b7eb53d21187d74feb95fcc32cc4e40d4b7c70243b0c74032ca453d5ad43ecfb0e33bfe047e3fbeffcdba8350b1ee75a3e4627d760af7c753b23f48f8d0971bd32462a7d8e917f9ec7b20408731f62a5deefa5565b7e2a2083e17b82493ca9c17212b51969d83c1435ece0804b11591a21fa80badb78144b94e725514c6ab0bfb3029612afd99e4a36284c746a29b6726235321a6eb0a9a17e13207e1cc76aa2334988db95e20cb857b4af598d48918611545f4bb21e5a39764ef6a2dcc646bcb11d26eb5ce6da5053ea23f87f4c710e6b5e24c524b36f25d9aa6bc004ca12786d5a87f5874bdd127958fb2ec6f4cd591ebd878c84188a239ea45f2553c16bebc03adc6f8b09ccc21d32ace822dc41d201e630b871f888fdc12a0ad50b7b804687d50cbe39507002ed76c0ec38e1540c07dde520d673362ffeaaa5dbe3ad8a39e4a4bb2719dc773019e0b771571411f56ea18479f6c5e02a8f43b85e0f89988ff9971e3159e2f5704aab3011c5a698011a531ee63b66d8339119a055aae6edad0d2085a6e4dc3ed49a7357a2b72b260eb7a0ea8d2c4eed8afe5f09be5b5c6c3dc02d71f3b2884fe7fec9a03318420cd2ca301cccd8a5527567a6f96109295eee988d8fb381b3b5b28bc142933e30ac29e79dc02aec233499ac2bd0d52aeb0f468a553979e65549ab3d41a87f4733e82c86e2931a287de49d7830c3e38e269b94c81bcd86245e80b4974a988e479133a58a920dd954592334a72d15f6bc1a7f46902ebf4072892aed64151afad7098dc53db76c6ec4358e2e4e3170055de328de000772ea698310ba1d5f50f7b58a8456bcec0c400301d33432b57c9bc3172cc8e1c2749501ce15ccbf8c07e423f496e40c6abb593dcee622159d81dd54b1a2a734d93366c93756d50f394eac7491402cf435f8e55660527af88f02e5ab28e85854e21e791eabecb43d03677ddebd024a2d6584cd71dda8d2c9794ce970c2037fe5804986a415b9886248264472624480e818486a2c95fe4a9ab15f2b7daf6f048a6d6ac2f89f3affe15e717cbd70a72990f7c7be5ebfc546b2d61b760ebe28fc35353c522789502b1fadade828677fa47f98f7038eec75548d4de5c3b07e6abf2faa761fcb2694422e29eba5b5f3e3f3e1af0498d0d61fc5e981fb1fc4adf3baa14708864a5f37f92b3c469b8793f702f3a7ae5e7c85a3b921764590985b9849cfc4f166de9d9f7705e92daf127ae58d89cbd7f6ca61135fa43a1dba1928f5aaadd0d498d589b9bea9bea98519fa09d9ff665580b4143159ffca25d1af5c11c2cd916b5aaf005afabc1e57fad95c153fffd67bf8f5627706764dfce24b97ddaf664df37ef98b119008c31ed3046685ec7d494ba1039ed02b601052a16dbf2c476a6a98bef253c9ba23fca800160adbbdf1156cc9ccb7fb976b1e1e9fedb023307977f6915f91d8075385a04b92da96ce4faa9de24c89927a8a0d453b78dce932593124b845222aa600b6358283db6a8ef3c956a1efa150805174b341de2ed9393c8cec46414f1d52ad1607ddb3dfd5709f3fbf394a2ded5d95bf0562680db85683a83ef9f70bcc35ecc600d89e71b0f26d046b1e7cd55abaf74c7a5c6f52ec6fb8772fec10c4391ced6978d52688ed2a39dc1f0509dae79de788beb0f704638deab984b4d1accabcde558711ddf05f139502c421d74bc4722685ff196e6e5de354cb9508ffda856b9d5b59669ea5d4ab9689639100d7e0c332b0f8f7066b2fbd42535985f0af13626b8d04879953158d99e46228c1d7fff2a27c518a1f902987aaa6526f314995b89ab64c8423ba2100d84c406fdd48019b0bd36b2195187fac87d70de60991fcf5bf0af65e83e3087f30a4ccd5cad41f189660e2b332f3e0f4fb5e8c4f412aa031dec3f170b186586a31044b4a060695cf28c88c159bdcdc0aa6dc92e7c39b580d0a43a72dcae8b137ee7aabcde56d5f5983d289b1560931df9ce3233744111888e3e2f12f4f5345cd1ebd0fffc22f8a239de8893d8219428e724162696540d412da2d244544ee075734981800397465eb3224e61f6d753a2ed78668a3bf76c2c95b5435119454fce7ae2bc26069123929a6bb16738f934f827c6a21391bba968981db3511f210442f2398d40e9a2209122d915eb4e3ab15e31e043e12281bd2bb11fa772ae734cf295d259e48d1a8500c059699981b016a884ecbcb3afbefd80a5f29a66f871b05fdf6d3791084dabc5d0511ab631db02a72e9c862be29948f43143e60f8bd0eb1d20a682758073dc10c50fd62de20d4b6d1e12795aadcde0ee954c9141ff032aa2bb544bfde715516e21b507e2009b31a0b691332f1ef10136010b8540d8cc19724a8f38512d9959169fd9724cf5e298c825a0b04514ee0823739a5c63c1c578ae2ce327bad96529e6ad1df908c52fc458a0073910f0c06aa52b233fc84911d67a73343a4e5781931ba15d5b0a46381c3b55edd17d325a22e27931e903cfb7cbe885e9c6f2a1302577d123f8b2d15569d2fe9a84ca5ba65dee768b4a33ba543beaae5e226165ded8df9411014e599441823f5f32e9e225714ed675ffd373df0ad0011b15ccb11dbb20abb5721addab7d848514f5869bf983c28ea0a9844b7333dc3564cf02396288731c066c98089e7955b785cd759a29cf55cc39d82869942d58e1d229773f3de7a19bdbfeaaa3870df3202c32ac86f6d4bd5ed11ae020311324aaf35e9fdc60f29aac0f36b87006cb693823443c73d7ac7702dee08d555b693be86a5550a57e4afabffc5ba6219f86231be601a3e48ef60a9ae790d5a7404343304ac40777d6b602d243be4528dc2fd048b567ae9f690a2149d060500f7a94ee2726eddda03afc6cc101c5b12563e0a31cac106d46be81531ab3685d01c1cadd2c701a8861a2051110b4ed410b1df7295314e85e58c20b7e94d7722a839952cc64fb75397b05c81baa87dd28ccb8d732a6b33ea7785a76534e6f16813be1fe7fce0255df38cc9aa69b949bf7befcc165cc8955e193f69e4982c3790b1b55810f38117a5a902f2a8fbf25c359e8704cb235ae95c9262cce8d942632f72c53d6dd5057cd3afa22ccb51e69875ccb32d841b1312f4129155533ee921ec2995b23fc0fbaa8d4a04fe86176e8fcc29aa0b8875e51c4f31e965ce047414e5ab95c32318757d3f8b945fd27cf92d9a170d8f109d47379e2f8890cc71e57948711424e7a6f71069547e88fa9facc1d6632a842ba9ed76bf2cba85e6ff71d659776ae120d964466f9d270953e7113bc3d8cd61a7ae455911b58dc473034408d2662e1986a5d9d633feffbddbccbffe1c862afd4a8aa4678a783adf8314d939bacd088a15d2c6db5efe7add257873721e7e695c4ed0a42cca18586ab0121e5c8464beae76fb3feeabbb07cd6225a8401d29f5cd7c06e6afb6c70116e0105af094738e3404ddd5b6b46d6e15d7a43063100a2a9e85be245ee69347df54b55c7edd2cfff0f1da6704358b3b188713a4b2a175102b0db81dd30430e6fa5a4ab5f015666c809aa6977d8f430f637e8bc45fbe1d1b74f526dba046aff9df34bf8ea8309d2840d9c0d23034653fb13b8d64500049ddcab76adb3bd8a6ce45f9288db5972b1abe42b24e428117116a30e6c52c397270cc12de397e84b88c88b202611e9638dc0195ab5b86d18e21edf1973f285b60282c1d12fb54bf2a8fa1d278d3c4ff142f79dfbdf982418d2800ac9331344c110b13bce093cdafc9e78f0ed1aef9423b9b172e16d24db3e439a97cbc60f26d36433144a849c5d438dcbeb6af9dcbe957bf2293ccbd3a47662382d1898e2c7c6000025e6f10c02e3a15d449bd959977cf2a129a66e48251725cf2480efe1bfacdf8164db970c61e75f41fb0b34b346357ce211e8fcfc27c06238ef54da7eb8f9d6a37a4f48ff30ff20ff83dc1eef4d2845a8849fba3ae50e8dbc5301a580475e3cbac5cedd2c743c5bb92ef24ae517a96fb1d8ab3146885dca5555d67b75ade4237a33328ce9e746a7cdf6fa5fbaad7ce3694e5885c790a18175f05ac2ffb36a4c7ec9edde2f9b5591fed5fd61188996f8510d2152365a83db28a407f3aa92829985b22cc33b9aefc130eff1d698bacb6f22bed2026036ad7d33b77200c71d10f9d42c67370e40240a8acacc0c433589c4fcad61d7e7dc3d3f6b78b76aeb951135409ad383348b28146a696aac248f985eb16d4254a6fbfa8173b4cbd2fb418e12b79e33f93ae9ba9dd0d04676b837fb97b6f118ca81c822542564559f4685e59244a28053e85897e1d039e4f3e3c5f1dd16f1479aa43617e07e69c6d25fffefd22e0476d59894297c7307a8c98353074d4bc87c4f108527ede43a693d750c68bc109d5a88618986cd6009f1358cdc14ac3d149caa55ee184cefb6a3305b9c7f2422bbbc029a22804f74b1f93545f985ee4a0ac710d165ef50a5a7ac32711d277393d7aad51fb0b7683acb2ce34d2d543e7db0d700fb5d0bf6643f5c54aa3fe1d83050a269fabbbf760863dd83fa3a9ae1132ee21f94273232e9a44ece81f9481c86ddcd2723da85274c9305e3badcd818c34c6a6ba75d5db82f239c8df0e5a0599a7f768f2fa39a738250cfbb672efb3f9598fb58d4693d45259ca6559d8bac3eac0185b517d545ee3f906e225dec01d7bb716e53f86ecad00ee8c2c7bbb9c5f202fdf253ad97e775351a332079ccf2910bd462bf0aafb9e89103e79a79203298b2176f88a0f7d479e8ff7f1c83aa794ace098a46a031fbcfbcc4e46fee76a2b8267c5d8beb550f17c0bbc5928d800"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057600)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057800)={0x7fff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}], 0x0, "8b6257f5c23665"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d0c0)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "b23df52e5eb7f3"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059f80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x0, "40dc7014873fcc"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004dc00)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r7}], 0x1, "59cae135f3e572"}) fchown(0xffffffffffffffff, 0xee00, 0xffffffffffffffff) syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x4040) [ 335.048052][T18221] loop1: detected capacity change from 0 to 16 [ 335.048923][T18220] loop3: detected capacity change from 0 to 6 [ 335.117096][ T37] audit: type=1804 audit(1630757658.215:231): pid=18227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/119/bus" dev="sda1" ino=14616 res=1 errno=0 [ 335.146986][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 335.147335][T18220] FAT-fs (loop3): Directory bread(block 6) failed 12:14:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x4040942c, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf0ffff, 0x0) 12:14:18 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000555000/0x4000)=nil, &(0x7f000089b000/0x1000)=nil, 0x4000}) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xbc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x42}, @mcast1, @mcast2, 0x0, 0x0, 0x0, 0x400, 0x2000000000000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000002c0)={r3}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000012c0)={0x0, r3, "6da0dc72ab17aa43a9c954794b6341e1b0792ab5c48895b60bd1b7e62859be59b129d802000000f5c553e7b77830ba51f889a8f90110dba57bf54ef8f750d6f690af66a163d3385f189be91b48276addf7d24f1c6a0c80727d060028ac5eacaa9fb2db65003bb2d8f3fce42b5158a9bec061f234d7d58ac7457563a5b01d8cdf727665ffb3c651de92ae7bb29b68578b1fbe9206e4a41f37bd2a0f9b2daa8d1b97933f04c5833132065fa97d0b9d6f3f9f23de4afdb2d30657cc146acd1e6b250cd59e84e769f09c837784059f60b730935b8870e8d708161eb4e374162f7a785c4ed9c2bef349a2228200", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057600)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057800)={0x7fff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}], 0x0, "8b6257f5c23665"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d0c0)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "b23df52e5eb7f3"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059f80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x0, "40dc7014873fcc"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000004dc00)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {r7}], 0x1, "59cae135f3e572"}) fchown(0xffffffffffffffff, 0xee00, 0xffffffffffffffff) syz_open_dev$usbmon(&(0x7f0000000040), 0x0, 0x4040) 12:14:18 executing program 4: semtimedop(0x0, 0x0, 0x0, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) semget(0x0, 0x1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x1, 0xf5d8, 0x1000}, {0x3, 0x2, 0x800}, {0x0, 0x78, 0x800}, {}, {0x2, 0x5000, 0x1000}, {0x2, 0x800, 0x1800}, {0x0, 0x9}, {0x2, 0x7fff, 0x1000}, {0x4, 0x80}, {0x2, 0x80, 0x1000}], 0xa) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000240)={{0x0, 0x3938700}}, &(0x7f00000002c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) semget$private(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000200)=[{}, {0x3, 0x7f}, {0x2, 0x40}, {0x4}, {0x0, 0xb5}, {0x0, 0x1000, 0x1800}], 0x6) clock_gettime(0x0, &(0x7f0000000180)) unshare(0x28020280) 12:14:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4c00, 0x0) 12:14:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x405c5503, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 335.278763][T18243] loop1: detected capacity change from 0 to 16 [ 335.288910][ T37] audit: type=1804 audit(1630757658.325:232): pid=18238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/119/bus" dev="sda1" ino=14616 res=1 errno=0 12:14:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1000000, 0x0) 12:14:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x41045508, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 335.450049][T18260] loop3: detected capacity change from 0 to 6 [ 335.506184][T18270] loop1: detected capacity change from 0 to 16 [ 335.514396][T18260] FAT-fs (loop3): Directory bread(block 6) failed 12:14:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6000, 0x0) [ 335.722289][T18284] loop3: detected capacity change from 0 to 6 [ 335.747965][T18284] FAT-fs (loop3): Directory bread(block 6) failed [ 335.765979][T18284] FAT-fs (loop3): Directory bread(block 6) failed 12:14:19 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x80045503, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:19 executing program 0: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipx\x00') syz_mount_image$hfsplus(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x100, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000080)={[{@part}, {@type={'type', 0x3d, "ddfc24fa"}}, {@session}, {@umask}, {@gid}, {@uid={'uid', 0x3d, 0xee01}}, {@umask}, {@part}, {@creator={'creator', 0x3d, "b441373d"}}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) write$P9_RREADDIR(r2, &(0x7f00000001c0)={0x49, 0x29, 0x1, {0x9c4a, [{{0x2, 0x3, 0x7}, 0x167, 0x3f, 0x7, './file1'}, {{0x2, 0x2, 0x1}, 0x5, 0x40, 0x7, './file0'}]}}, 0x49) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) syz_mount_image$zonefs(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffffffffffffff, 0x7, &(0x7f00000018c0)=[{&(0x7f00000004c0)="02acd93f6b191eeb2a90b334b55235b0a7648fe3a4562cfda6f81df58890bf819d55518a7f638aeff8b6bd88803e2a66c471f770ab0fc715ed9fcb257798020357b8f4100c28f94ddb9d17b97a5b9e82f1d07cbc121e1ba85a4317342d4836bea9e2d035650c9416e7ca42c84e1456ec233104872e3fc3c21b5d8bb8", 0x7c, 0xffffffffffffffc0}, {&(0x7f0000000540)="95ff579d0f40867abc4096484b75afc252be9d847fb7a4bcfb8bebbd302fa502b2eb2eb18197d1924d262804f251e506954275bf8435cc7d5cac5a636ce5b06a3b087816af95e7c4a38eea64b707bf5597cbeba478cd28c45155518bb683951f1cf9f20b0f8425323c4463321bef26ae36376b828073fb7c0eea0ed1eaf7b64afe652f317c2afa219823520a7d369261e6562577e5143b60d2932360eca4ef5b3bac5062c64d57cb4faa44493b9966a9603141c50d1b30ee69f9b5d0eacf646ab56eaf8589", 0xc5}, {&(0x7f0000000640)="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", 0x1000, 0x7}, {&(0x7f0000001640)="196a4d846b54f2d1b8765f4fac189017ffe6d18a812281e18ac05d9b1f459300ec5404412c7338b9d7281cfa6d1dad701c7a7e912df9b1927609d810c0fed5683c6674ba4bed841c3a9f1913f8071fa8b6eb62515ee920b81653e1a38a700baa719f39d584ba99ddc80a585fb0ff774e5d2c35b042aff2d7b25eccfd65226208c339d03465035ef54116d2aa1145a167ac61496212bc5a79943ccf2e66b1853ae25af7e3963099cc409bad2762249dd1032f959a7d807521267bf7423732cb2c784219adcd430f5b0ee821e4162b", 0xce, 0x4f90}, {&(0x7f0000001740)="31998290a9bc9d133fef52b302f12eaa237126dc945d34db211722756e80a3ca87be68bbc1e83a32f9aed7ba3b8b6d6287cbed9ed48be2d5718c9b4d72e1cc168b132bfd68e98d8b0ae2037fb1b7ddd868cb3dc5f21194a9fbb2e4845ed35046d601aa983213e759e90a527a51565780b69454ad80a79b9684fe33d0e6a83eaf66c63ffd3275a60c0f69d127d2d15e1c689f00b5a0a4431e995c7d2b56f74affb9a055621e870d3c4e58dcc3883529bc031a2b521eaae1a0314a86a3b6ba770681b77f23108b648bda577b3028706316600687b6ab7a915b64508c8121267ebf2112aeae03d594a5409abf455d2acc2a767159fdbf5f06", 0xf7, 0x8}, {&(0x7f0000001840)="24ce9f473da6c59c27c33751f677aca71b8e4b854c1ab561314ac74b92c1af99f20ad756f806326e967540febeaa146dc8745434ed36297497e6c7ff8bf817215cfe43315583b61fde2c4a4154ab6b5d1ccdb280ccec2e285258255a7451ad2bf638f4d3278f5cc4aded76576d93ce56b64f1f3e84bddb4764045e3d83", 0x7d, 0x3}, {&(0x7f0000000400), 0x0, 0xfffffffffffffffd}], 0x218050, &(0x7f0000001980)={[{}, {@explicit_open}, {@errors_repair}], [{@subj_role={'subj_role', 0x3d, 'net/ipx\x00'}}, {@dont_hash}, {@obj_role={'obj_role', 0x3d, ')-[+'}}, {@subj_user={'subj_user', 0x3d, '{,.('}}, {@obj_role={'obj_role', 0x3d, 'net/ipx\x00'}}, {@smackfsfloor}, {@dont_measure}]}) ioctl$NS_GET_OWNER_UID(r2, 0xb704, &(0x7f0000000300)=0x0) mount$overlay(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000280), 0x40000, &(0x7f0000000340)=ANY=[@ANYBLOB='metacopy=on,redirect_dir=./file1,metacopy=on,xino=auto,workdir=./file1,workdir=./file0,fowner=', @ANYRESDEC=r3, @ANYBLOB]) dup2(r0, r1) 12:14:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x2000000, 0x0) 12:14:19 executing program 4: semtimedop(0x0, 0x0, 0x0, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) semget(0x0, 0x1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x1, 0xf5d8, 0x1000}, {0x3, 0x2, 0x800}, {0x0, 0x78, 0x800}, {}, {0x2, 0x5000, 0x1000}, {0x2, 0x800, 0x1800}, {0x0, 0x9}, {0x2, 0x7fff, 0x1000}, {0x4, 0x80}, {0x2, 0x80, 0x1000}], 0xa) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000240)={{0x0, 0x3938700}}, &(0x7f00000002c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) semget$private(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000200)=[{}, {0x3, 0x7f}, {0x2, 0x40}, {0x4}, {0x0, 0xb5}, {0x0, 0x1000, 0x1800}], 0x6) clock_gettime(0x0, &(0x7f0000000180)) unshare(0x28020280) 12:14:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6800, 0x0) [ 336.009620][T18300] usb usb9: usbfs: process 18300 (syz-executor.5) did not claim interface 0 before use [ 336.015997][T18301] loop3: detected capacity change from 0 to 6 [ 336.025441][T18305] loop1: detected capacity change from 0 to 16 [ 336.045789][ T37] audit: type=1804 audit(1630757659.145:233): pid=18302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/120/bus" dev="sda1" ino=14632 res=1 errno=0 [ 336.048769][T18304] hfsplus: gid requires an argument [ 336.079066][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x3000000, 0x0) [ 336.113170][T18312] usb usb9: usbfs: process 18312 (syz-executor.5) did not claim interface 0 before use [ 336.163353][T18301] FAT-fs (loop3): Directory bread(block 6) failed 12:14:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x80045505, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6c00, 0x0) [ 336.198966][ T37] audit: type=1804 audit(1630757659.295:234): pid=18302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/120/bus" dev="sda1" ino=14632 res=1 errno=0 [ 336.249768][T18304] hfsplus: unable to parse mount options [ 336.312102][T18327] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #129 [ 336.344195][T18317] hfsplus: gid requires an argument [ 336.349201][T18332] loop3: detected capacity change from 0 to 6 [ 336.349426][T18317] hfsplus: unable to parse mount options 12:14:19 executing program 4: semtimedop(0x0, 0x0, 0x0, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) unshare(0x8000400) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/nf_conntrack\x00') read$FUSE(r1, &(0x7f0000000400)={0x2020}, 0x2020) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) semget(0x0, 0x1, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x1, 0xf5d8, 0x1000}, {0x3, 0x2, 0x800}, {0x0, 0x78, 0x800}, {}, {0x2, 0x5000, 0x1000}, {0x2, 0x800, 0x1800}, {0x0, 0x9}, {0x2, 0x7fff, 0x1000}, {0x4, 0x80}, {0x2, 0x80, 0x1000}], 0xa) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000240)={{0x0, 0x3938700}}, &(0x7f00000002c0)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) semget$private(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000200)=[{}, {0x3, 0x7f}, {0x2, 0x40}, {0x4}, {0x0, 0xb5}, {0x0, 0x1000, 0x1800}], 0x6) clock_gettime(0x0, &(0x7f0000000180)) unshare(0x28020280) [ 336.378615][T18332] FAT-fs (loop3): Directory bread(block 6) failed [ 336.390033][T18338] loop1: detected capacity change from 0 to 16 [ 336.396999][T18304] loop0: detected capacity change from 0 to 264192 12:14:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8004550f, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 336.427255][T18332] FAT-fs (loop3): Directory bread(block 6) failed 12:14:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r1, 0x10e, 0xb, &(0x7f0000000040)="00000002", 0x4) getresgid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) sendmsg(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffd5b, &(0x7f0000003980)=[{&(0x7f00000001c0)="230000000f0007041dfffd942461050002000000fcc3953a1df7a8c5070016000400ff7e280000001100ffff0100a0aa1c0900000000000012000000000000eff24d8538cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 336.572905][T18362] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 12:14:19 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7400, 0x0) 12:14:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4000000, 0x0) 12:14:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x80045510, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:19 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x25) r1 = syz_open_dev$hiddev(0xfffffffffffffffc, 0x0, 0x60141) ioctl$HIDIOCAPPLICATION(r1, 0x40305828, 0x54000f) r2 = syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x1) write$hidraw(r2, &(0x7f0000001200)="b4", 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r3, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) ioctl$NBD_SET_BLKSIZE(r3, 0xab01, 0x7f) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r4, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) r5 = dup3(r1, r0, 0x80000) write$P9_RSYMLINK(r5, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x1, 0x4, 0x4}}, 0x14) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000000)={0x7, 0xe5, 0xc4, &(0x7f00000000c0)="78cc60d5ef891e7a0c4f123bd6699f83de5d73e31996aa816d3c2017159fd954c43af924ea5b60b19abe436055866fdbf51cbe7af7e4eb83ec9e0a3d38e5d0cff76b98bd9cee2d2e300649afa45a3b301f0225c9c177fe2ab9da5fb3fedfe47f2030f3d01d616547f183e8996908a60df5fbcc661e3df5f23552fc006f4ee09d95e35871ea5ee8b53831002bbcae1e0f69191b7c6fde5601f841d22fa58f487117b82f3923972a753adb32d4ac90da880ef861769505cbfd610978ea30c972341b7d69dd"}) r6 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r6, 0x80104592, &(0x7f0000000600)={0x0, 0x0, 0x0, 0xff, "06015400000000000000000000000100000000000000120001000100"}) syz_open_dev$hidraw(0xfffffffffffffffc, 0x0, 0x42200) 12:14:19 executing program 0: syz_open_dev$sndctrl(&(0x7f0000006000), 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000240), 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r1, 0x4, 0xfffffffffffff800}) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e24, 0x3fb1, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x3}, 0x1c) r4 = openat$cgroup_ro(r3, &(0x7f0000000100)='cpu.stat\x00', 0x0, 0x0) epoll_pwait(r4, &(0x7f0000000200)=[{}, {}], 0x2, 0x100, &(0x7f0000000280)={[0x8]}, 0x8) [ 336.905864][T18378] loop3: detected capacity change from 0 to 6 [ 336.926022][T18382] loop1: detected capacity change from 0 to 16 12:14:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x80045515, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 336.950900][T18378] FAT-fs (loop3): Directory bread(block 6) failed 12:14:20 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="1800000001d9230000000000124000000800070000000000"], 0x18}}, 0x0) 12:14:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x5000000, 0x0) 12:14:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7a00, 0x0) [ 337.015553][ T37] audit: type=1804 audit(1630757660.115:235): pid=18390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/121/bus" dev="sda1" ino=14612 res=1 errno=0 [ 337.048183][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 337.093183][T18397] usb usb9: usbfs: process 18397 (syz-executor.5) did not claim interface 0 before use [ 337.138496][T18406] loop1: detected capacity change from 0 to 16 [ 337.138855][T18407] loop3: detected capacity change from 0 to 6 [ 337.162465][T18410] usb usb9: usbfs: process 18410 (syz-executor.5) did not claim interface 0 before use 12:14:20 executing program 4: ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000040)={0x0, 0x0, 0x5}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0), 0x200) ioctl$TUNSETLINK(r3, 0x400454cd, 0x13) sendmsg$nl_route(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400000011000100"/20, @ANYRES32=0x0, @ANYBLOB="0000000000e6ffff1300030073797a6b616c6c657231"], 0x34}}, 0x0) 12:14:20 executing program 0: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xbc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x42}, @mcast1, @mcast2, 0x0, 0x2, 0x0, 0x0, 0x2000000000000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000001300)=ANY=[@ANYRES64=r3, @ANYBLOB="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"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000002c0)={r3}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, r3, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057600)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057800)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}], 0x0, "8b6257f5c23665"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d0c0)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "b23df52e5eb7f3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f0000001240)=""/144, 0x90}], 0x1, 0x0, 0x0) [ 337.171706][ T37] audit: type=1804 audit(1630757660.115:236): pid=18383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name=2F726F6F742F73797A6B616C6C65722D746573746469723633363831333737342F73797A6B616C6C65722E7470334952712F3132372F48C7C060 dev="sda1" ino=14641 res=1 errno=0 [ 337.215256][T18407] FAT-fs (loop3): Directory bread(block 6) failed [ 337.248690][ T37] audit: type=1804 audit(1630757660.205:237): pid=18391 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name=2F726F6F742F73797A6B616C6C65722D746573746469723633363831333737342F73797A6B616C6C65722E7470334952712F3132372F48C7C060 dev="sda1" ino=14641 res=1 errno=0 12:14:20 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x80045518, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf000, 0x0) 12:14:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)={0x40, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_FRAME={0x1e, 0x33, @deauth={@wo_ht={{}, {}, @broadcast, @device_b, @from_mac=@broadcast}, 0x0, @void}}, @NL80211_ATTR_CSA_C_OFFSETS_TX={0x4}]}, 0x40}}, 0x0) 12:14:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6000000, 0x0) 12:14:20 executing program 0: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xbc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x42}, @mcast1, @mcast2, 0x0, 0x2, 0x0, 0x0, 0x2000000000000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000001300)=ANY=[@ANYRES64=r3, @ANYBLOB="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"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000002c0)={r3}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, r3, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057600)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057800)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}], 0x0, "8b6257f5c23665"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d0c0)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "b23df52e5eb7f3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f0000001240)=""/144, 0x90}], 0x1, 0x0, 0x0) [ 337.912665][T18458] loop3: detected capacity change from 0 to 6 [ 337.944670][T18462] loop1: detected capacity change from 0 to 16 12:14:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x80045519, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 337.996530][T18458] FAT-fs (loop3): Directory bread(block 6) failed 12:14:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe0000, 0x0) 12:14:21 executing program 4: syz_emit_ethernet(0x23a, &(0x7f0000000200)={@broadcast, @remote, @void, {@ipv6={0x86dd, @generic={0x9, 0x6, "14dde6", 0x204, 0x5e, 0x0, @local, @remote, {[@srh={0x5e, 0xa, 0x4, 0x5, 0xd0, 0x48, 0xf20c, [@ipv4={'\x00', '\xff\xff', @remote}, @dev={0xfe, 0x80, '\x00', 0x3a}, @private2={0xfc, 0x2, '\x00', 0x1}, @remote, @private0]}, @srh={0x3, 0xc, 0x4, 0x6, 0x9, 0x8, 0x400, [@empty, @remote, @ipv4={'\x00', '\xff\xff', @remote}, @loopback, @mcast1, @dev={0xfe, 0x80, '\x00', 0x1f}]}, @srh={0x2b, 0xe, 0x4, 0x7, 0x2, 0x40, 0x8001, [@loopback, @mcast2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xb}}, @remote, @remote, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @remote}]}, @hopopts={0xff, 0x0, '\x00', [@pad1]}, @routing={0xec8106cb0245cb0d, 0x8, 0x2, 0x5, 0x0, [@mcast1, @private2, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}, @hopopts={0x2f}], "f8af0d4e997ff2cb0e6dab11ee6b361e269ba1ef047a82fdb5671c71e961d5d5dcf216839ba7fb1996523a077cd62a3001dfe0aaa4ca830d21c9eeb96afb1015bb855dceb9844686d507e382a9e47a779b217ec94c93bcfbd31bcfd1e83a6b94224755d736e9af8f1d411fe5"}}}}}, 0x0) syz_emit_ethernet(0x112, &(0x7f0000000000)={@empty, @multicast, @void, {@mpls_mc={0x8848, {[{0x9}, {0x1, 0x0, 0x1}, {0x7c}, {0x7}], @ipv6=@dccp_packet={0x3, 0x6, '=\\)', 0xcc, 0x21, 0x0, @empty, @loopback, {[@fragment={0x88, 0x0, 0x6, 0x0, 0x0, 0x5, 0x66}, @srh={0x2c, 0x8, 0x4, 0x4, 0x23, 0x48, 0x4, [@rand_addr=' \x01\x00', @ipv4={'\x00', '\xff\xff', @empty}, @mcast1, @private2]}, @hopopts={0x89, 0x7, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x2}, @pad1, @calipso={0x7, 0x30, {0x0, 0xa, 0x7, 0x9, [0x5f08, 0xb452, 0x6, 0x81, 0x90c]}}]}], {{0x4e21, 0x4e20, 0x4, 0x1, 0x9, 0x0, 0x0, 0x3, 0x1, "b63833", 0x81, 'Xhk'}, "a8731426053a9b453157fae63f179a85babedb8beb5e04487e47ceb9f92a9e7452e7c4d1"}}}}}}}, 0x0) syz_extract_tcp_res(&(0x7f0000000200)={0x41424344, 0x41424344}, 0x69bc, 0x7e7) write$tun(0xffffffffffffffff, &(0x7f0000000340)={@void, @val={0x0, 0x0, 0x0, 0x0, 0x754}, @mpls={[], @ipv4=@tcp={{0xd, 0x4, 0x2, 0x8, 0x78, 0x0, 0x0, 0x26, 0x6, 0x0, @local, @dev, {[@rr={0x7, 0xf, 0x0, [@loopback, @broadcast, @loopback]}, @timestamp_prespec={0x44, 0x4}, @timestamp={0x44, 0xc, 0x81, 0x0, 0x3, [0x6, 0x0]}]}}, {{0x4e22, 0x4e23, 0x41424344, r0, 0x0, 0x0, 0xb, 0x40, 0x2, 0x0, 0x7, {[@window={0x3, 0x3, 0x20}, @mss={0x2, 0x4, 0xe000}, @generic={0x2, 0x10, "f3e3482a772acb190b375e1f4954"}, @nop]}}, {"768b5f28883fc69543184dc7eac755b0da3a7f479796f516"}}}}}, 0x82) syz_extract_tcp_res$synack(&(0x7f0000000140)={0x41424344, 0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x1c7, &(0x7f0000000440)={@multicast, @local, @val={@val={0x9100, 0x7, 0x1}, {0x8100, 0x0, 0x0, 0x3}}, {@mpls_mc={0x8848, {[{0x2}, {0xff}, {0x200}, {0x9}, {0x9, 0x0, 0x1}], @ipv4=@tcp={{0x20, 0x4, 0x0, 0x1b, 0x19d, 0x66, 0x0, 0x8, 0x6, 0x0, @empty, @multicast1, {[@ssrr={0x89, 0x23, 0x5b, [@empty, @multicast2, @broadcast, @multicast2, @local, @multicast1, @local, @rand_addr=0x64010100]}, @timestamp_addr={0x44, 0x1c, 0x78, 0x1, 0x3, [{@dev={0xac, 0x14, 0x14, 0x3b}, 0x2}, {@remote, 0x10000}, {@dev={0xac, 0x14, 0x14, 0xb}, 0x8}]}, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x20, 0x2, [{0x2, 0xa, "91c513f6b95be66b"}, {0x0, 0x10, "dc7e67f65ed73a498387c4db3f31"}]}, @generic={0x94, 0x9, "be2c836c9ce21b"}]}}, {{0x4e20, 0x4e24, r0, r1, 0x0, 0x0, 0xa, 0xc2, 0x1, 0x0, 0x81, {[@timestamp={0x8, 0xa, 0x6, 0x7}, @timestamp={0x8, 0xa, 0x4, 0xa91}]}}, {"904dca30d6751ea654b9508350e3febbdfa75563338b50d7b36d285a96b1d7333ba232a0dc88a6e95a191fe8965819e8898971ba204973d09666003d2a6fb88772c0de2324a1e4d93a0a5628945b162fc36109fcd41fded730a623e8b45f4e7b0201a9598c0b9c3b4a82863e281dc47812889213f7888e104748bedb7cd8418c757966d52fe3ccc2771fed4d62f7f03d419526c9a86ad81006f82f5a093cfb9385e8c8372b24c44866670c4629f675da6fc0f51de5b4701fb991b8863ec172661404d46c9309673d936ea5b374f273e200ed637b822bb4f1227567bae4606995c13e837a28ba35f494aa18e47bde315472d592427c"}}}}}}}, &(0x7f0000000180)={0x1, 0x3, [0xf77, 0x5bf, 0xc48, 0x625]}) 12:14:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7000000, 0x0) [ 338.052933][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:21 executing program 0: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xbc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x42}, @mcast1, @mcast2, 0x0, 0x2, 0x0, 0x0, 0x2000000000000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000001300)=ANY=[@ANYRES64=r3, @ANYBLOB="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"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000002c0)={r3}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, r3, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057600)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057800)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}], 0x0, "8b6257f5c23665"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d0c0)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "b23df52e5eb7f3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f0000001240)=""/144, 0x90}], 0x1, 0x0, 0x0) 12:14:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8004551a, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 338.221160][T18493] loop3: detected capacity change from 0 to 6 [ 338.224141][T18491] loop1: detected capacity change from 0 to 16 [ 338.232814][T18493] FAT-fs (loop3): Directory bread(block 6) failed [ 338.267735][T18493] FAT-fs (loop3): Directory bread(block 6) failed 12:14:21 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:21 executing program 4: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000002240), 0x0, &(0x7f00000021c0)=ANY=[@ANYRESHEX, @ANYBLOB="0d181f2ea6f3b86162169c8ec64670a506a9695bfbd0ced9d2c23d7e9b2c0c0e119eaf4e3b82bdbb0005568e2334fe7e1b842d", @ANYRESDEC=0x0]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) r1 = dup2(r0, r0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f00000020c0)) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002000), 0x0, &(0x7f0000002280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f0000004340)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000002140)={0x50, 0x0, r2, {0x7, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="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", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x800}}}, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) ioctl$SG_IO(r3, 0x401070c9, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x20) 12:14:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x80085504, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x100000, 0x0) 12:14:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x8000000, 0x0) 12:14:21 executing program 0: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, 0x0) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xbc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000440)={@dev={0xfe, 0x80, '\x00', 0x42}, @mcast1, @mcast2, 0x0, 0x2, 0x0, 0x0, 0x2000000000000000}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000001300)=ANY=[@ANYRES64=r3, @ANYBLOB="2f00040000afeef3624d00000000002add19698fdaa917f1ffdbde37e0a23a05319496823e031c7a43c7887004ef27a7c7f9fec711000000ea0c3ebc190b5207a944ed55bcc1f3f88b2a442c46df8c838876f1d987289e1f2432927f56dc6a8fceebc93ab3db41e5a95506b56967cd4063fe633f7bbb5bc5837a90a4000000000000000000000000000006eea1881d38fdb97b1fb2338678a0402625d72809c145d7443e4af28cc8a05b7d676cb12c5eb31bee7b6662805ce75fc53b4c056958dfe09ebc3b1f4b729bccf224556e18e2d72d08e531c035348868cacbdb5fb746977665ed0055d8fe867c752ddb454ef0d0e0ada1daf4cf95b51f89d343f18dc4e9b7cab057dd498ddcce2b03e9d83afba166adbc4a075fe7c4b556a574c64c4085f7e78e910d5ad700000000c7e9c25cd0c31d6b4648bc7c1b66825bdd5e92e1fce9c551b9bf538836affdef56f8b9319c0574848d13642c3e65fea8296de3e136338e8118b7b464a461f1e04521c6f4264168558b8c406b7376a740f2206e690eacb823"]) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000002c0)={r3}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000040)={0x0, r3, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000057600)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057800)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3, r4}], 0x0, "8b6257f5c23665"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005d0c0)={0x7ff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x1, "b23df52e5eb7f3"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) preadv(r5, &(0x7f0000000180)=[{&(0x7f0000001240)=""/144, 0x90}], 0x1, 0x0, 0x0) [ 338.909635][T18521] loop1: detected capacity change from 0 to 16 [ 338.922555][T18524] loop3: detected capacity change from 0 to 6 12:14:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8008550e, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 338.971318][T18524] FAT-fs (loop3): Directory bread(block 6) failed [ 339.004607][ T37] kauditd_printk_skb: 3 callbacks suppressed 12:14:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x9000000, 0x0) [ 339.004622][ T37] audit: type=1804 audit(1630757662.105:241): pid=18534 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/123/bus" dev="sda1" ino=14671 res=1 errno=0 [ 339.040735][T18536] FAT-fs (loop3): Directory bread(block 6) failed [ 339.047821][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x200000, 0x0) 12:14:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8008551c, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 339.069563][T18525] sd 0:0:1:0: PR command failed: 2 [ 339.075849][T18525] sd 0:0:1:0: Sense Key : Illegal Request [current] [ 339.106743][T18525] sd 0:0:1:0: Add. Sense: Invalid command operation code 12:14:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8004551a, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:22 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 339.157862][ T37] audit: type=1804 audit(1630757662.245:242): pid=18542 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/123/bus" dev="sda1" ino=14671 res=1 errno=0 [ 339.236046][T18549] loop3: detected capacity change from 0 to 6 [ 339.242939][T18550] loop1: detected capacity change from 0 to 16 12:14:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8004551a, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r3, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) sendmsg$nl_route_sched(r3, &(0x7f0000000800)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000007c0)={&(0x7f0000000480)=@newtfilter={0x340, 0x2c, 0x200, 0x70bd25, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0x2, 0xfff3}, {0x5, 0x1}, {0xfffe, 0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x104, 0x2, [@TCA_MATCHALL_ACT={0x100, 0x2, [@m_vlan={0xfc, 0xa, 0x0, 0x0, {{0x9}, {0x78, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x9867, 0x8, 0x4, 0x80}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x3ea}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x7, 0x7, 0x7, 0x7}, 0x1}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x1}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x3, 0x2, 0x7, 0x5, 0x97}, 0x3}}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}]}, {0x59, 0x6, "95a4a785145307bdc0dfb1ae6f9b9db03a3c655dfea2baa97b96bb5076da1a1213eabd6b826098222424df2ee70ea26122e770219f2dfd33d7aaf5a74fc8fd21a86eb43362cab41c27dbdcf39c276a81bebf511f98"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}]}}, @filter_kind_options=@f_flow={{0x9}, {0x180, 0x2, [@TCA_FLOW_PERTURB={0x8, 0xc, 0x40}, @TCA_FLOW_KEYS={0x8, 0x1, 0x66ed}, @TCA_FLOW_EMATCHES={0x15c, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xc4, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x4, 0x3, 0x6f}, {0x5, 0x9, 0x9, 0x7}}}, @TCF_EM_NBYTE={0x1c, 0x3, 0x0, 0x0, {{0x7f, 0x2, 0x83}, {0xfff, 0x7, 0x1, "9d6741495ef648"}}}, @TCF_EM_META={0xfffffffffffffd5a, 0x2, 0x0, 0x0, {{0x1, 0x4, 0x7fff}, [@TCA_EM_META_RVALUE={0x3c, 0x3, [@TCF_META_TYPE_VAR="224f8cb2e9", @TCF_META_TYPE_VAR="dc0915e059", @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_VAR="8e2cf86813f132495928", @TCF_META_TYPE_VAR="07630c28f6b5da2276c2", @TCF_META_TYPE_VAR="09c100b8958c786c796c", @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x9]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xff, 0x31, 0x2}, {0xcfa, 0x6}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x1f, 0x2}, {0x400, 0x1}}}, @TCA_EM_META_LVALUE={0x25, 0x2, [@TCF_META_TYPE_VAR="ed1527", @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="a15b4a4111b4", @TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="d0bf9918c7bcbc", @TCF_META_TYPE_VAR="322a67497fda4ebb42", @TCF_META_TYPE_INT=0x7]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x352b}}, @TCA_EMATCH_TREE_LIST={0x8c, 0x2, 0x0, 0x1, [@TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xfffe, 0x1, 0xfff}, {0x3f, 0x8, 0x2, 0x3, 0xf, 0x2}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x8, 0x7, 0x5}, {{0x1, 0x1}, {0x1, 0x0, 0x0, 0x1}}}}, @TCF_EM_IPT={0x5c, 0x2, 0x0, 0x0, {{0x2}, [@TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x1}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x1}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x1}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}]}}]}]}, @TCA_FLOW_MASK={0x8, 0x6, 0x945}, @TCA_FLOW_RSHIFT={0x8, 0x4, 0x80000001}]}}, @filter_kind_options=@f_flower={{0xb}, {0x60, 0x2, [@TCA_FLOWER_KEY_ETH_DST={0xa, 0x4, @multicast}, @TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x9300}, @TCA_FLOWER_KEY_TCP_DST={0x6}, @TCA_FLOWER_KEY_TCP_DST_MASK={0x6}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x80}, @TCA_FLOWER_KEY_ARP_THA={0xa}, @TCA_FLOWER_KEY_IPV6_DST={0x14, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}, @TCA_FLOWER_KEY_IP_TOS={0x5, 0x49, 0x7}, @TCA_FLOWER_KEY_ENC_IP_TOS_MASK={0x5, 0x51, 0x40}]}}, @TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_CHAIN={0x8, 0xb, 0x8}]}, 0x340}, 0x1, 0x0, 0x0, 0x80}, 0x40088c4) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000980)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0x84, 0x0, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xff}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3f}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x84}, 0x1, 0x0, 0x0, 0x90}, 0x20840) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_COOKIE={0xc}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x8}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x68}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x50}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x31}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x45}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x8000) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0001000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xf, 0xc}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}}, 0x0) r4 = socket(0x1000000010, 0x80002, 0x0) r5 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000200), 0x10efe10675dec16, 0x0) r6 = open(&(0x7f0000002080)='./file0\x00', 0x400180, 0x106) sendmsg$nl_route(r6, &(0x7f0000002180)={&(0x7f00000020c0)={0x10, 0x0, 0x0, 0x96ac32c9fa276455}, 0xc, &(0x7f0000002140)={&(0x7f0000002100)=@RTM_GETMDB={0x18, 0x56, 0x20, 0x70bd2b, 0x25dfdbfc, {0x7, r2}, ["", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r7, 0x8912, 0x400308) sendmmsg$alg(r4, &(0x7f0000000200), 0x57, 0x0) [ 339.295895][T18549] FAT-fs (loop3): Directory bread(block 6) failed 12:14:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x400000, 0x0) 12:14:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xa000000, 0x0) 12:14:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8008551d, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 339.338633][ T37] audit: type=1804 audit(1630757662.435:243): pid=18566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/124/bus" dev="sda1" ino=14663 res=1 errno=0 [ 339.369243][T18571] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 339.387264][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 339.415389][T18571] device veth15 entered promiscuous mode 12:14:22 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8004551a, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 339.421178][ T37] audit: type=1804 audit(1630757662.515:244): pid=18566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/124/bus" dev="sda1" ino=14663 res=1 errno=0 [ 339.470801][T18571] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 339.482279][T18591] loop1: detected capacity change from 0 to 16 12:14:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x80086301, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 339.522816][T18597] loop3: detected capacity change from 0 to 6 [ 339.546078][T18571] device veth17 entered promiscuous mode 12:14:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xc000000, 0x0) 12:14:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 339.569508][T18597] FAT-fs (loop3): Directory bread(block 6) failed [ 339.580742][ T37] audit: type=1804 audit(1630757662.675:245): pid=18617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/125/bus" dev="sda1" ino=14667 res=1 errno=0 [ 339.601701][T18597] FAT-fs (loop3): Directory bread(block 6) failed 12:14:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x80086601, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:22 executing program 4: sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c030100", @ANYRES16=0x0, @ANYBLOB="000026bd7000fcdbdf25540000000c00990006000000250000000a00060008021100000000000a000600ffffffffffff00000a000600ffffffffffff00000a00060008021100000000000a000600ffffffffffff0000"], 0x5c}}, 0x90) syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="cefaad1b00140000ff7f", 0xa}, {&(0x7f0000010100)="0200000007", 0x5, 0x200}], 0x0, &(0x7f0000000500)=ANY=[]) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r0, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1d4, r2, 0x20, 0x70bd2b, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_FRAME={0x50, 0x33, @action_no_ack={@with_ht={{{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {}, @device_b, @device_a, @from_mac, {0x9, 0x8}}, @ver_80211n={0x0, 0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1}}, @sp_mp_open={0xf, 0x1, {0x1, {0x1, 0x6, [{0x60}, {0x1}, {0x48}, {0x6, 0x1}, {0x48}, {0x4, 0x1}]}, @val={0x72, 0x6}, @val={0x2d, 0x1a, {0x10, 0x3, 0x5, 0x0, {0x0, 0x5, 0x0, 0x9, 0x0, 0x1}, 0x300, 0x7}}}}}}, @NL80211_ATTR_FRAME={0x22, 0x33, @disassoc={@with_ht={{{0x0, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x1}, {0x9}, @device_a, @broadcast, @from_mac=@broadcast, {0x9, 0xf81}}, @ver_80211n={0x0, 0x5, 0x2, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}}, 0x6, @void}}, @NL80211_ATTR_FRAME={0x142, 0x33, @probe_request={@wo_ht={{0x0, 0x0, 0x4, 0x0, 0x0, 0x1}, {0x4}, @device_a, @device_a, @from_mac=@broadcast, {0xb, 0x80}}, @val={0x0, 0xe, @random="18b27d2fddcedf6b7e07e9eec0b9"}, @val={0x1, 0x8, [{0x6c}, {0x1}, {0x1b}, {0x3}, {0x1b, 0x1}, {0x4}, {0xb}, {0x2}]}, @void, @val={0x2d, 0x1a, {0x1, 0x3, 0x0, 0x0, {0x0, 0x2, 0x0, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1}, 0x400, 0x6, 0x40}}, @val={0x72, 0x6}, [{0xdd, 0xca, "0d96d6aca826a8130be8f79904bc3b72d84fe0a99f0e7819890872e191a1e050184e2171c5c83e12fe097da704aa081440dbcfb447d00f5260549036a1dfab40171e9329679eb42c078a88c343f45ecd2c9fcd10fe820816f794eb7c7390494bd6bea384a5b5384f44c423ea6802205f6e896bfe75c515f6987f818a1a0253814c2b5042a3e3474203a79454eb8d91dec76d80b0b0cf2f1ac49e3a8a0cadc0790ce0b12b761b47bf972d65963f1687ca6f539fe7904281c2e575e247af400032763368a1d150ade51db6"}, {0xdd, 0x1a, "394fa8b75a85caf36cba38a491dbb2c71a6c1ad309f7a24ca180"}]}}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) [ 339.624459][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x600000, 0x0) 12:14:22 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 339.665003][ T37] audit: type=1804 audit(1630757662.735:246): pid=18617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/125/bus" dev="sda1" ino=14667 res=1 errno=0 12:14:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 339.735280][T18628] loop4: detected capacity change from 0 to 2 [ 339.750351][T18628] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing [ 339.750662][T18631] loop1: detected capacity change from 0 to 16 12:14:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8010550e, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 339.785924][T18628] BFS-fs: bfs_fill_super(): Last block not available on loop4: 63 [ 339.792127][T18642] loop3: detected capacity change from 0 to 6 [ 339.817573][T18642] FAT-fs (loop3): Directory bread(block 6) failed [ 339.823292][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:22 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r3, 0xffffffffffffffff, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 339.824413][ T37] audit: type=1804 audit(1630757662.915:247): pid=18638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/126/bus" dev="sda1" ino=14670 res=1 errno=0 12:14:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xd000000, 0x0) [ 339.898917][T18628] loop4: detected capacity change from 0 to 2 [ 339.927996][T18648] FAT-fs (loop3): Directory bread(block 6) failed 12:14:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 339.949335][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 339.952983][T18628] BFS-fs: bfs_fill_super(): loop4 is unclean, continuing 12:14:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x80ffff, 0x0) 12:14:23 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r3, 0xffffffffffffffff, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 339.987384][ T37] audit: type=1804 audit(1630757662.935:248): pid=18638 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/126/bus" dev="sda1" ino=14670 res=1 errno=0 [ 340.015444][T18628] BFS-fs: bfs_fill_super(): Last block not available on loop4: 63 12:14:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x801c581f, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 340.095902][T18666] loop1: detected capacity change from 0 to 16 12:14:23 executing program 4: read$FUSE(0xffffffffffffffff, &(0x7f0000000640)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$inet6(0xa, 0x1, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)='./file0\x00') openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000001740)={[{@uid={'uid', 0x3d, r2}}]}) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x40022, &(0x7f0000000240)={[{@huge_within_size}, {@gid={'gid', 0x3d, r0}}], [{@euid_eq={'euid', 0x3d, r2}}]}) r3 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000007, 0x10, r3, 0x63de9000) pipe(&(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x84) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x300}, 0x0, r4}) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000580), 0x0, 0x0, 0x0) umount2(0x0, 0x0) socket(0x1, 0x0, 0x6) 12:14:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf000000, 0x0) 12:14:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x802c550a, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 340.134806][ T37] audit: type=1804 audit(1630757663.045:249): pid=18658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/127/bus" dev="sda1" ino=14675 res=1 errno=0 12:14:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 340.191713][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 340.198946][T18684] loop3: detected capacity change from 0 to 6 12:14:23 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r3, 0xffffffffffffffff, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 340.276808][T18684] FAT-fs (loop3): Directory bread(block 6) failed [ 340.294357][T18696] loop1: detected capacity change from 0 to 16 12:14:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8038550a, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfffffff, 0x0) [ 340.311022][ T37] audit: type=1804 audit(1630757663.055:250): pid=18658 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/127/bus" dev="sda1" ino=14675 res=1 errno=0 12:14:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xc0ffff, 0x0) 12:14:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x20}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELOBJ={0x70, 0x14, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x7}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x2}]}], {0x14}}, 0xd4}, 0x1, 0x0, 0x0, 0x2004c000}, 0x8000) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x68, 0x9, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_EXPR={0x2c, 0x11, 0x0, 0x1, @numgen={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NG_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_NG_DREG={0x8}]}}}]}], {0x14, 0x10}}, 0xb0}}, 0x0) [ 340.440305][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:23 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x8108551b, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 340.526324][T18718] loop1: detected capacity change from 0 to 16 [ 340.531455][T18719] loop3: detected capacity change from 0 to 6 12:14:23 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 340.572264][T18719] FAT-fs (loop3): Directory bread(block 6) failed 12:14:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x11000000, 0x0) 12:14:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0x81f8943c, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe0ffff, 0x0) [ 340.643131][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:23 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:23 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0045878, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 340.736962][T18741] loop1: detected capacity change from 0 to 16 12:14:23 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x13000000, 0x0) [ 340.835479][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 340.965851][ T199] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 340.976282][T18761] loop3: detected capacity change from 0 to 6 [ 340.995768][T18761] FAT-fs (loop3): Directory bread(block 6) failed [ 342.165342][ T199] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:14:25 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f00000000000000020000000600000000ff07000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4dc}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000008000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) capset(&(0x7f0000000080), 0x0) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0xcd, 0x40, 0x40, 0x0, 0x0, 0xfffffffffffff001, 0x22929, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa031, 0x0, @perf_config_ext={0x81, 0x7f}, 0x0, 0x0, 0xffffffff, 0x4, 0x5, 0xef05, 0x9, 0x0, 0x9b4}, 0xffffffffffffffff, 0x1, r0, 0xb) r2 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) r3 = dup(0xffffffffffffffff) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x7b, 0x1}, 0x7) write$FUSE_BMAP(r3, 0x0, 0x0) r4 = syz_open_procfs(r1, 0x0) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0) sendmsg$nl_netfilter(r4, &(0x7f0000001d80)={&(0x7f0000000980), 0xc, &(0x7f0000001d40)={&(0x7f0000001dc0)=ANY=[@ANYRES64, @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB, @ANYRES32=r1, @ANYBLOB='\x00'], 0x1248}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000400)=0x10, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[@ANYBLOB="1f04000000ffff04003950303030e1c95a02a9f6f2bf4b4edada6bf2e1bc65f93368188da1b8e67360501ddc30709158362f63e84c26900e1c52747a36bd0027000000000000875616bdfb5168094b792e93d3318944b028ec91cb185aa1ee6750bc91b20dbda8dfd488a89652af6f9177ecf32a6724588e5b520f767d45b9263cff0f5c1aff00"], 0x15) r5 = syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f0000000300)='./file0/file1\x00', 0x3ff, 0x5, &(0x7f0000000840)=[{&(0x7f0000000440)="1b9da19931578b51065a673d29a0d9c557b17cf7449df2fd36078d5f67b545ecb3e36c031a4b9b519021842a4f09e730767def290a12e42cd980ea0b4607bb1cd7caaa476008de55027027f56c672e49d98a3673aa26b3381384629e09ec9cbd35f815c7219c03d056c0d84274cd5eb3c8f9dadcdb90fc1bf1e8df7c25edd445c400feee63003945df3093704ca0e31ad5b03937be5f1410ecc4ab7fefda46e12c929cb93d8a40afaca504c9ffc056d95f5bca9837a6945ca7a5a1ad001af3fd16a3df6657c5d69919681a457ff84799a8f5eaa1c58abbfd9e13f60264ccc173", 0xe0, 0x1}, {&(0x7f0000000540)="66d35e3dc44a2a29cc97778a22446817f98dcce4fbf34ead79120c045c39bb382af3fa3cce8880c1a0f9ca7948b13205132f326433fae5d0c1b29f4f67354bb4dba700ec80eb4ef171321f8f862cc0f3fc04311f2604dcf3b72cdd0707c26805b52b805ae505ec2d3bd5ba", 0x6b, 0xff}, {&(0x7f00000005c0), 0x0, 0xf5}, {&(0x7f00000006c0)="312a59d12ef1b74b19ce50e210709fde64910a9c6555b103cd48d8775301400f48084c57340b98831d6802a41dde168e1bdb5685bca4808d62f816d42d9e10834a2f529b3df80e27cb47b775baa5b6cabe6008e14ec2a23e4d3a9231ef20c20b673a86f73b771764512b4b37391c323451e4f456b2b897fbd101fba7d8f5e3be19a55093ee8165acf0bbc4345afab9c039262a30530a7d25a100212eaa31a9cdc23093", 0xa3, 0x956}, {&(0x7f0000000780)="8ed090637e0b9881f25b91d920b10f2b6764f730369b9b9e19a429d4cb7050ecb6096bc98308a520a53458b2fb417ed409b438f811494f5aaa61a71cdc26d0bed1341c5c29c53208866b23845a1e3a79a9ba34fa9ac20c3cda78c1e4abbe9ae5afa46d9cbff73dcd213f65c52bdb543f492cd708588c476aeed673a3c61351bf05344523783bb08b2ff16945cf08520b5329ca69c2dc4306a8f371ff94", 0x9d, 0x7}], 0x2, &(0x7f00000008c0)={[{@mode={'mode', 0x3d, 0x6}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}], [{@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@dont_measure}, {@dont_measure}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_appraise}, {@smackfshat}]}) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f00000003c0)={r5, 0x4, 0x7, 0xe95}) 12:14:25 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0045878, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x18000000, 0x0) 12:14:25 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf0ffff, 0x0) [ 342.296706][ T199] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:14:25 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 342.380455][T18786] loop1: detected capacity change from 0 to 16 [ 342.389159][T18788] loop3: detected capacity change from 0 to 6 12:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc00c5512, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:25 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(0x0, 0x0) [ 342.442963][T18788] FAT-fs (loop3): Directory bread(block 6) failed [ 342.461687][ T199] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 12:14:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1f000000, 0x0) 12:14:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1000000, 0x0) 12:14:25 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105500, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x121200, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x11, 0xffffffffffffffff, 0xfb255000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000040)="95c6ecadde1a4cd50cc40cf3b258a42e5eb5a5c7cd38402bc52e925cfd177779ae9a9814320b5a8ccbb44fc0c592460a6e718d8654938fe3483a22c0ea0221a24d64b9aab69b1d39e20fbd095646a4ecc036d127b16940278580d19f692a23fd36e80d7906dcd113", 0x68}], 0x1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:14:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 342.648340][T18823] loop1: detected capacity change from 0 to 16 [ 342.674699][T18826] loop3: detected capacity change from 0 to 6 12:14:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x20000000, 0x0) [ 342.736219][T18831] usb usb9: usbfs: process 18831 (syz-executor.5) did not claim interface 0 before use [ 342.759452][T18826] FAT-fs (loop3): Directory bread(block 6) failed 12:14:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x2000000, 0x0) 12:14:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 342.783370][T18836] usb usb9: usbfs: process 18836 (syz-executor.5) did not claim interface 0 before use 12:14:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105503, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 342.875462][T18844] loop1: detected capacity change from 0 to 16 12:14:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 342.918717][T18850] loop3: detected capacity change from 0 to 6 [ 342.941504][T18850] FAT-fs (loop3): Directory bread(block 6) failed [ 342.964185][T18850] FAT-fs (loop3): Directory bread(block 6) failed 12:14:26 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(0x0, 0x0) 12:14:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105504, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x3f000000, 0x0) 12:14:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x3000000, 0x0) 12:14:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 343.508242][T18876] loop3: detected capacity change from 0 to 6 [ 343.527843][T18881] loop1: detected capacity change from 0 to 16 [ 343.569454][T18876] FAT-fs (loop3): Directory bread(block 6) failed [ 343.594386][ C0] net_ratelimit: 2 callbacks suppressed [ 343.594404][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 344.043579][ T8952] Bluetooth: hci1: command 0x0406 tx timeout [ 344.051005][ T8952] Bluetooth: hci5: command 0x0406 tx timeout [ 344.070212][ T8952] Bluetooth: hci4: command 0x0406 tx timeout [ 344.145208][ T199] device hsr_slave_0 left promiscuous mode [ 344.158377][ T199] device hsr_slave_1 left promiscuous mode [ 344.173744][ T199] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 344.181244][ T199] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 344.201796][ T199] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 344.210023][ T199] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 344.219590][ T199] device bridge_slave_1 left promiscuous mode [ 344.232540][ T199] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.241936][ T199] device bridge_slave_0 left promiscuous mode [ 344.250530][ T199] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.261633][ T199] device veth1_macvtap left promiscuous mode [ 344.270052][ T199] device veth0_macvtap left promiscuous mode [ 344.276657][ T199] device veth1_vlan left promiscuous mode [ 344.282519][ T199] device veth0_vlan left promiscuous mode [ 346.895536][ T199] bond2 (unregistering): Released all slaves [ 346.932520][ T199] bond1 (unregistering): Released all slaves [ 347.047630][ T199] team0 (unregistering): Port device team_slave_1 removed [ 347.061118][ T199] team0 (unregistering): Port device team_slave_0 removed [ 347.087069][ T199] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 347.102011][ T199] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 347.187986][ T199] bond0 (unregistering): Released all slaves [ 347.372387][T18930] chnl_net:caif_netlink_parms(): no params data found [ 347.437235][T18930] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.446144][T18930] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.454173][T18930] device bridge_slave_0 entered promiscuous mode [ 347.462425][T18930] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.469794][T18930] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.477597][T18930] device bridge_slave_1 entered promiscuous mode [ 347.546675][T18930] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 347.605502][T18930] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 347.628775][T18930] team0: Port device team_slave_0 added [ 347.649653][T18930] team0: Port device team_slave_1 added [ 347.690025][T18930] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 347.703945][T18930] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 347.761030][T18930] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 347.785525][T18930] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 347.792564][T18930] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 347.853575][T18930] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 347.918212][T18930] device hsr_slave_0 entered promiscuous mode [ 347.934138][T18930] device hsr_slave_1 entered promiscuous mode [ 347.954463][T18930] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 347.966889][T18930] Cannot create hsr debugfs directory [ 348.112355][T18930] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.119742][T18930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.127058][T18930] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.134111][T18930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.229090][T18930] 8021q: adding VLAN 0 to HW filter on device bond0 [ 348.243187][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.252480][T10392] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.268657][T10392] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.297548][T18930] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.308048][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 348.318656][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.327831][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.334901][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.354202][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.362815][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.373780][T10392] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.380914][T10392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.391032][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 348.415209][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 348.425010][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 348.435426][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 348.445182][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 348.455768][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 348.466094][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 348.476297][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.485250][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 348.493448][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.504215][T18930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 348.515649][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 348.524951][ T26] Bluetooth: hci3: command 0x0409 tx timeout [ 348.543626][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 348.551060][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 348.564362][T18930] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 348.638250][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 348.650432][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 348.670591][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 348.681115][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 348.694345][T18930] device veth0_vlan entered promiscuous mode [ 348.705580][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 348.713296][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 348.723779][T18930] device veth1_vlan entered promiscuous mode [ 348.745245][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 348.753021][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 348.762356][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 348.772016][T10392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 348.784867][T18930] device veth0_macvtap entered promiscuous mode [ 348.797731][T18930] device veth1_macvtap entered promiscuous mode [ 348.812624][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 348.825869][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 348.837156][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 348.850134][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 348.860384][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 348.873725][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 348.885796][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 348.896815][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 348.909234][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 348.920381][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 348.934582][T18930] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 348.943838][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 348.952280][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 348.963687][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 348.972103][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 348.985452][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 348.999639][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 349.010427][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 349.022423][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 349.032893][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 349.043980][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 349.056203][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 349.067287][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 349.077801][T18930] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 349.089133][T18930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 349.100417][T18930] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 349.109187][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 349.124089][ T8952] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 349.209669][ T325] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 349.231410][ T325] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 349.246539][T10454] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 349.281577][ T262] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 349.302299][ T262] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 349.312433][T10454] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 12:14:32 executing program 4: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x104e042, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)=@getchain={0x2c, 0x66, 0x100, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x9, 0xfff2}, {0x10, 0x1}, {0xfff1, 0xffe0}}, [{0x8, 0xb, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10000}, 0x4000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='ext4_ext_handle_unwritten_extents\x00', r2}, 0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x208202) sendfile(r0, r1, 0x0, 0x8000fffffffa) 12:14:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105505, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x60000000, 0x0) 12:14:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4000000, 0x0) 12:14:32 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(0x0, 0x0) [ 349.440471][T19275] loop1: detected capacity change from 0 to 16 [ 349.452425][T19276] loop3: detected capacity change from 0 to 6 [ 349.459887][ T37] kauditd_printk_skb: 12 callbacks suppressed [ 349.459901][ T37] audit: type=1804 audit(1630757672.555:263): pid=19280 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/135/bus" dev="sda1" ino=14717 res=1 errno=0 [ 349.464103][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 349.510671][ T37] audit: type=1800 audit(1630757672.605:264): pid=19284 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14721 res=0 errno=0 12:14:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105507, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 349.547118][T19276] FAT-fs (loop3): Directory bread(block 6) failed 12:14:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7f510100, 0x0) 12:14:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x5000000, 0x0) [ 349.618190][ T37] audit: type=1800 audit(1630757672.715:265): pid=19284 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14721 res=0 errno=0 12:14:32 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) sync_file_range(r0, 0x7, 0xe601, 0x5) r1 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}, 0x8}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="200000000000000029000000370000000000000100000000000000380000000000000029000000040000000004000000000000021355d4c5e5e05d9bdaa95d47e4573b4ae6f507b90401400502000005020000"], 0x58}, 0x0) 12:14:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105508, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:32 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(0x0, 0x0) r1 = syz_mount_image$efs(0x0, &(0x7f00000001c0)='./file1\x00', 0x65, 0x0, 0x0, 0x280050, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7f08000000000000646566636f6e746578743d73797361646d5f752c00"]) statx(r1, &(0x7f0000000800)='./file1\x00', 0x0, 0x0, &(0x7f0000001180)) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) acct(&(0x7f0000001300)='./file3\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000640)='./bus/file0\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="5569643d06647efe07a349a6046cad2e11601cfd8b2a81ee11c84dcd5a2d7515f6351c386f5a082e39259642e7dee70ea300c783cabe3845931b5abef34bd404200c4f23ec5d47d0dcf54f34985d89d873a7ac87ed838dbd393b15de62bfec8cee6f056676ba37628e695349c511f9b16526dacd7579c1ca916e57590b0f0729d8117e6000aab099ebc43d7a09fadb5665bd9ec257107e462fdf398e6545735c48edd00de782cbdeeaa81d970a6fc48b00f0d218d9", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500), 0xa009, &(0x7f0000000840)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732f66696c65302c78696e6f3d6f66662c78696e6f3d6175746f2c6c6f7765726469723d2e2f62bb8f6d267569643c9581fad0e4adf892409e519a792e3d7c65411be8cbb8018a8774e3df40c2cf1f9178d91477d5928a6fa4b48ae772935ef17d7a2e4b4194ccc7181e44b72a29b6eb428b35449af6224a24300e24bda2cd92081c2f1650c026e447cb30", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0x4, 0x8, 0x17, 0x7, 0x0, 0x80000001, 0x800, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x4000a, 0x5ef15abb, 0x8, 0x5, 0x63, 0x1, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000780)={[{@index_on}, {@nfs_export_on}], [{@permit_directio}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x62, 0x38, 0x66, 0x38, 0x63], 0x2d, [0x35, 0x0, 0x0, 0x32], 0x2d, [0x37, 0x38, 0x37, 0x34], 0x2d, [0x0, 0x5f, 0x0, 0x37], 0x2d, [0x35, 0x32, 0x36, 0x30, 0x35, 0x30, 0x63]}}}, {@obj_user={'obj_user', 0x3d, '\x14'}}, {@euid_gt}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') [ 349.736581][T19304] loop1: detected capacity change from 0 to 16 [ 349.753390][T19311] loop3: detected capacity change from 0 to 6 [ 349.777075][T19311] FAT-fs (loop3): Directory bread(block 6) failed [ 349.791754][T19311] FAT-fs (loop3): Directory bread(block 6) failed 12:14:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x8cffffff, 0x0) 12:14:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6000000, 0x0) [ 349.924603][T19318] hfs: unable to parse mount options [ 349.932631][T19328] loop3: detected capacity change from 0 to 6 [ 349.942647][T19332] loop1: detected capacity change from 0 to 16 [ 349.944132][T19328] FAT-fs (loop3): Directory bread(block 6) failed [ 349.960805][T19328] FAT-fs (loop3): Directory bread(block 6) failed [ 349.985766][T19318] overlayfs: unrecognized mount option "permit_directio" or missing value [ 350.007521][T19318] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 350.081859][T19344] hfs: unable to parse mount options [ 350.154364][T19351] overlayfs: unrecognized mount option "permit_directio" or missing value 12:14:33 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(0x0, 0x0) r1 = syz_mount_image$efs(0x0, &(0x7f00000001c0)='./file1\x00', 0x65, 0x0, 0x0, 0x280050, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7f08000000000000646566636f6e746578743d73797361646d5f752c00"]) statx(r1, &(0x7f0000000800)='./file1\x00', 0x0, 0x0, &(0x7f0000001180)) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) acct(&(0x7f0000001300)='./file3\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000640)='./bus/file0\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="5569643d06647efe07a349a6046cad2e11601cfd8b2a81ee11c84dcd5a2d7515f6351c386f5a082e39259642e7dee70ea300c783cabe3845931b5abef34bd404200c4f23ec5d47d0dcf54f34985d89d873a7ac87ed838dbd393b15de62bfec8cee6f056676ba37628e695349c511f9b16526dacd7579c1ca916e57590b0f0729d8117e6000aab099ebc43d7a09fadb5665bd9ec257107e462fdf398e6545735c48edd00de782cbdeeaa81d970a6fc48b00f0d218d9", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500), 0xa009, &(0x7f0000000840)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732f66696c65302c78696e6f3d6f66662c78696e6f3d6175746f2c6c6f7765726469723d2e2f62bb8f6d267569643c9581fad0e4adf892409e519a792e3d7c65411be8cbb8018a8774e3df40c2cf1f9178d91477d5928a6fa4b48ae772935ef17d7a2e4b4194ccc7181e44b72a29b6eb428b35449af6224a24300e24bda2cd92081c2f1650c026e447cb30", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0x4, 0x8, 0x17, 0x7, 0x0, 0x80000001, 0x800, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x4000a, 0x5ef15abb, 0x8, 0x5, 0x63, 0x1, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000780)={[{@index_on}, {@nfs_export_on}], [{@permit_directio}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x62, 0x38, 0x66, 0x38, 0x63], 0x2d, [0x35, 0x0, 0x0, 0x32], 0x2d, [0x37, 0x38, 0x37, 0x34], 0x2d, [0x0, 0x5f, 0x0, 0x37], 0x2d, [0x35, 0x32, 0x36, 0x30, 0x35, 0x30, 0x63]}}}, {@obj_user={'obj_user', 0x3d, '\x14'}}, {@euid_gt}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 12:14:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105512, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe5ffffff, 0x0) 12:14:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7000000, 0x0) 12:14:33 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(0x0, 0x0) r1 = syz_mount_image$efs(0x0, &(0x7f00000001c0)='./file1\x00', 0x65, 0x0, 0x0, 0x280050, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7f08000000000000646566636f6e746578743d73797361646d5f752c00"]) statx(r1, &(0x7f0000000800)='./file1\x00', 0x0, 0x0, &(0x7f0000001180)) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) acct(&(0x7f0000001300)='./file3\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000640)='./bus/file0\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="5569643d06647efe07a349a6046cad2e11601cfd8b2a81ee11c84dcd5a2d7515f6351c386f5a082e39259642e7dee70ea300c783cabe3845931b5abef34bd404200c4f23ec5d47d0dcf54f34985d89d873a7ac87ed838dbd393b15de62bfec8cee6f056676ba37628e695349c511f9b16526dacd7579c1ca916e57590b0f0729d8117e6000aab099ebc43d7a09fadb5665bd9ec257107e462fdf398e6545735c48edd00de782cbdeeaa81d970a6fc48b00f0d218d9", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500), 0xa009, &(0x7f0000000840)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732f66696c65302c78696e6f3d6f66662c78696e6f3d6175746f2c6c6f7765726469723d2e2f62bb8f6d267569643c9581fad0e4adf892409e519a792e3d7c65411be8cbb8018a8774e3df40c2cf1f9178d91477d5928a6fa4b48ae772935ef17d7a2e4b4194ccc7181e44b72a29b6eb428b35449af6224a24300e24bda2cd92081c2f1650c026e447cb30", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0x4, 0x8, 0x17, 0x7, 0x0, 0x80000001, 0x800, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x4000a, 0x5ef15abb, 0x8, 0x5, 0x63, 0x1, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000780)={[{@index_on}, {@nfs_export_on}], [{@permit_directio}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x62, 0x38, 0x66, 0x38, 0x63], 0x2d, [0x35, 0x0, 0x0, 0x32], 0x2d, [0x37, 0x38, 0x37, 0x34], 0x2d, [0x0, 0x5f, 0x0, 0x37], 0x2d, [0x35, 0x32, 0x36, 0x30, 0x35, 0x30, 0x63]}}}, {@obj_user={'obj_user', 0x3d, '\x14'}}, {@euid_gt}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') [ 350.339539][T19361] loop1: detected capacity change from 0 to 16 [ 350.347883][T19364] loop3: detected capacity change from 0 to 6 12:14:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf60f0000, 0x0) 12:14:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105514, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 350.381456][T19364] FAT-fs (loop3): Directory bread(block 6) failed [ 350.415973][T19364] FAT-fs (loop3): Directory bread(block 6) failed [ 350.417238][T19365] hfs: unable to parse mount options 12:14:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf000000, 0x0) [ 350.500342][T19373] hfs: unable to parse mount options [ 350.516023][T19365] overlayfs: unrecognized mount option "permit_directio" or missing value [ 350.528872][T19387] loop1: detected capacity change from 0 to 16 [ 350.546007][T19365] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 350.574069][T19373] overlayfs: unrecognized mount option "permit_directio" or missing value [ 350.588872][T19399] loop3: detected capacity change from 0 to 6 12:14:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105538, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:33 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(0x0, 0x0) r1 = syz_mount_image$efs(0x0, &(0x7f00000001c0)='./file1\x00', 0x65, 0x0, 0x0, 0x280050, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7f08000000000000646566636f6e746578743d73797361646d5f752c00"]) statx(r1, &(0x7f0000000800)='./file1\x00', 0x0, 0x0, &(0x7f0000001180)) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) acct(&(0x7f0000001300)='./file3\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000640)='./bus/file0\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="5569643d06647efe07a349a6046cad2e11601cfd8b2a81ee11c84dcd5a2d7515f6351c386f5a082e39259642e7dee70ea300c783cabe3845931b5abef34bd404200c4f23ec5d47d0dcf54f34985d89d873a7ac87ed838dbd393b15de62bfec8cee6f056676ba37628e695349c511f9b16526dacd7579c1ca916e57590b0f0729d8117e6000aab099ebc43d7a09fadb5665bd9ec257107e462fdf398e6545735c48edd00de782cbdeeaa81d970a6fc48b00f0d218d9", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500), 0xa009, &(0x7f0000000840)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732f66696c65302c78696e6f3d6f66662c78696e6f3d6175746f2c6c6f7765726469723d2e2f62bb8f6d267569643c9581fad0e4adf892409e519a792e3d7c65411be8cbb8018a8774e3df40c2cf1f9178d91477d5928a6fa4b48ae772935ef17d7a2e4b4194ccc7181e44b72a29b6eb428b35449af6224a24300e24bda2cd92081c2f1650c026e447cb30", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0x4, 0x8, 0x17, 0x7, 0x0, 0x80000001, 0x800, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x4000a, 0x5ef15abb, 0x8, 0x5, 0x63, 0x1, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000780)={[{@index_on}, {@nfs_export_on}], [{@permit_directio}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x62, 0x38, 0x66, 0x38, 0x63], 0x2d, [0x35, 0x0, 0x0, 0x32], 0x2d, [0x37, 0x38, 0x37, 0x34], 0x2d, [0x0, 0x5f, 0x0, 0x37], 0x2d, [0x35, 0x32, 0x36, 0x30, 0x35, 0x30, 0x63]}}}, {@obj_user={'obj_user', 0x3d, '\x14'}}, {@euid_gt}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 12:14:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf6ffffff, 0x0) 12:14:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 350.604216][ T8952] Bluetooth: hci3: command 0x041b tx timeout [ 350.628671][T19373] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 350.639350][T19399] FAT-fs (loop3): Directory bread(block 6) failed 12:14:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc010554e, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:33 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(0x0, 0x0) r1 = syz_mount_image$efs(0x0, &(0x7f00000001c0)='./file1\x00', 0x65, 0x0, 0x0, 0x280050, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7f08000000000000646566636f6e746578743d73797361646d5f752c00"]) statx(r1, &(0x7f0000000800)='./file1\x00', 0x0, 0x0, &(0x7f0000001180)) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) acct(&(0x7f0000001300)='./file3\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000640)='./bus/file0\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="5569643d06647efe07a349a6046cad2e11601cfd8b2a81ee11c84dcd5a2d7515f6351c386f5a082e39259642e7dee70ea300c783cabe3845931b5abef34bd404200c4f23ec5d47d0dcf54f34985d89d873a7ac87ed838dbd393b15de62bfec8cee6f056676ba37628e695349c511f9b16526dacd7579c1ca916e57590b0f0729d8117e6000aab099ebc43d7a09fadb5665bd9ec257107e462fdf398e6545735c48edd00de782cbdeeaa81d970a6fc48b00f0d218d9", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500), 0xa009, &(0x7f0000000840)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732f66696c65302c78696e6f3d6f66662c78696e6f3d6175746f2c6c6f7765726469723d2e2f62bb8f6d267569643c9581fad0e4adf892409e519a792e3d7c65411be8cbb8018a8774e3df40c2cf1f9178d91477d5928a6fa4b48ae772935ef17d7a2e4b4194ccc7181e44b72a29b6eb428b35449af6224a24300e24bda2cd92081c2f1650c026e447cb30", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0x4, 0x8, 0x17, 0x7, 0x0, 0x80000001, 0x800, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x4000a, 0x5ef15abb, 0x8, 0x5, 0x63, 0x1, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000780)={[{@index_on}, {@nfs_export_on}], [{@permit_directio}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x62, 0x38, 0x66, 0x38, 0x63], 0x2d, [0x35, 0x0, 0x0, 0x32], 0x2d, [0x37, 0x38, 0x37, 0x34], 0x2d, [0x0, 0x5f, 0x0, 0x37], 0x2d, [0x35, 0x32, 0x36, 0x30, 0x35, 0x30, 0x63]}}}, {@obj_user={'obj_user', 0x3d, '\x14'}}, {@euid_gt}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') [ 350.697501][T19410] FAT-fs (loop3): Directory bread(block 6) failed [ 350.707808][T19412] loop1: detected capacity change from 0 to 16 12:14:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x13000000, 0x0) 12:14:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfeffffff, 0x0) 12:14:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc010556c, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 350.840465][T19429] loop3: detected capacity change from 0 to 6 [ 350.840767][T19416] hfs: unable to parse mount options [ 350.873433][T19429] FAT-fs (loop3): Directory bread(block 6) failed [ 350.908838][T19429] FAT-fs (loop3): Directory bread(block 6) failed [ 350.922090][T19428] hfs: unable to parse mount options [ 350.940051][T19444] loop1: detected capacity change from 0 to 16 12:14:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 350.955599][T19416] overlayfs: unrecognized mount option "permit_directio" or missing value 12:14:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1f000000, 0x0) [ 350.981374][T19416] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 351.010693][T19428] overlayfs: unrecognized mount option "permit_directio" or missing value 12:14:34 executing program 4: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(0x0, 0x0) r1 = syz_mount_image$efs(0x0, &(0x7f00000001c0)='./file1\x00', 0x65, 0x0, 0x0, 0x280050, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7f08000000000000646566636f6e746578743d73797361646d5f752c00"]) statx(r1, &(0x7f0000000800)='./file1\x00', 0x0, 0x0, &(0x7f0000001180)) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) acct(&(0x7f0000001300)='./file3\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000640)='./bus/file0\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="5569643d06647efe07a349a6046cad2e11601cfd8b2a81ee11c84dcd5a2d7515f6351c386f5a082e39259642e7dee70ea300c783cabe3845931b5abef34bd404200c4f23ec5d47d0dcf54f34985d89d873a7ac87ed838dbd393b15de62bfec8cee6f056676ba37628e695349c511f9b16526dacd7579c1ca916e57590b0f0729d8117e6000aab099ebc43d7a09fadb5665bd9ec257107e462fdf398e6545735c48edd00de782cbdeeaa81d970a6fc48b00f0d218d9", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500), 0xa009, &(0x7f0000000840)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732f66696c65302c78696e6f3d6f66662c78696e6f3d6175746f2c6c6f7765726469723d2e2f62bb8f6d267569643c9581fad0e4adf892409e519a792e3d7c65411be8cbb8018a8774e3df40c2cf1f9178d91477d5928a6fa4b48ae772935ef17d7a2e4b4194ccc7181e44b72a29b6eb428b35449af6224a24300e24bda2cd92081c2f1650c026e447cb30", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0x4, 0x8, 0x17, 0x7, 0x0, 0x80000001, 0x800, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x4000a, 0x5ef15abb, 0x8, 0x5, 0x63, 0x1, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000780)={[{@index_on}, {@nfs_export_on}], [{@permit_directio}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x62, 0x38, 0x66, 0x38, 0x63], 0x2d, [0x35, 0x0, 0x0, 0x32], 0x2d, [0x37, 0x38, 0x37, 0x34], 0x2d, [0x0, 0x5f, 0x0, 0x37], 0x2d, [0x35, 0x32, 0x36, 0x30, 0x35, 0x30, 0x63]}}}, {@obj_user={'obj_user', 0x3d, '\x14'}}, {@euid_gt}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') 12:14:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xff000000, 0x0) 12:14:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0185500, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 351.054187][T19428] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 351.093084][T19459] loop3: detected capacity change from 0 to 6 12:14:34 executing program 2: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(0x0, 0x0) r1 = syz_mount_image$efs(0x0, &(0x7f00000001c0)='./file1\x00', 0x65, 0x0, 0x0, 0x280050, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7f08000000000000646566636f6e746578743d73797361646d5f752c00"]) statx(r1, &(0x7f0000000800)='./file1\x00', 0x0, 0x0, &(0x7f0000001180)) mkdir(&(0x7f0000000580)='./bus\x00', 0x0) acct(&(0x7f0000001300)='./file3\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000640)='./bus/file0\x00', 0x0) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="5569643d06647efe07a349a6046cad2e11601cfd8b2a81ee11c84dcd5a2d7515f6351c386f5a082e39259642e7dee70ea300c783cabe3845931b5abef34bd404200c4f23ec5d47d0dcf54f34985d89d873a7ac87ed838dbd393b15de62bfec8cee6f056676ba37628e695349c511f9b16526dacd7579c1ca916e57590b0f0729d8117e6000aab099ebc43d7a09fadb5665bd9ec257107e462fdf398e6545735c48edd00de782cbdeeaa81d970a6fc48b00f0d218d9", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000500), 0xa009, &(0x7f0000000840)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732f66696c65302c78696e6f3d6f66662c78696e6f3d6175746f2c6c6f7765726469723d2e2f62bb8f6d267569643c9581fad0e4adf892409e519a792e3d7c65411be8cbb8018a8774e3df40c2cf1f9178d91477d5928a6fa4b48ae772935ef17d7a2e4b4194ccc7181e44b72a29b6eb428b35449af6224a24300e24bda2cd92081c2f1650c026e447cb30", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0x4, 0x8, 0x17, 0x7, 0x0, 0x80000001, 0x800, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000280), 0x8}, 0x4000a, 0x5ef15abb, 0x8, 0x5, 0x63, 0x1, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000780)={[{@index_on}, {@nfs_export_on}], [{@permit_directio}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x62, 0x38, 0x66, 0x38, 0x63], 0x2d, [0x35, 0x0, 0x0, 0x32], 0x2d, [0x37, 0x38, 0x37, 0x34], 0x2d, [0x0, 0x5f, 0x0, 0x37], 0x2d, [0x35, 0x32, 0x36, 0x30, 0x35, 0x30, 0x63]}}}, {@obj_user={'obj_user', 0x3d, '\x14'}}, {@euid_gt}]}) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000540)='./bus\x00') rename(&(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)='./file0\x00') [ 351.121037][T19459] FAT-fs (loop3): Directory bread(block 6) failed 12:14:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 351.164099][T19459] FAT-fs (loop3): Directory bread(block 6) failed [ 351.171598][T19469] usb usb9: usbfs: process 19469 (syz-executor.5) did not claim interface 0 before use [ 351.178987][T19471] loop1: detected capacity change from 0 to 16 12:14:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x20000000, 0x0) [ 351.208859][T19475] usb usb9: usbfs: process 19475 (syz-executor.5) did not claim interface 0 before use 12:14:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xff0f0000, 0x0) 12:14:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 351.290107][T19476] hfs: unable to parse mount options [ 351.296035][T19478] hfs: unable to parse mount options [ 351.352038][T19476] overlayfs: unrecognized mount option "permit_directio" or missing value [ 351.359965][T19490] usb usb9: usbfs: process 19490 (syz-executor.5) did not claim interface 0 before use [ 351.366717][T19489] loop3: detected capacity change from 0 to 6 [ 351.398450][T19478] overlayfs: unrecognized mount option "permit_directio" or missing value [ 351.405371][T19501] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 351.428172][T19502] usb usb9: usbfs: process 19502 (syz-executor.5) did not claim interface 0 before use [ 351.437200][T19503] loop1: detected capacity change from 0 to 16 12:14:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) 12:14:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0189436, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x44140000, 0x0) [ 351.450932][T19489] FAT-fs (loop3): Directory bread(block 6) failed [ 351.467823][T19478] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 12:14:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfffdffff, 0x0) 12:14:34 executing program 2 (fault-call:12 fault-nth:0): r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) 12:14:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0205648, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 351.618757][T19524] loop3: detected capacity change from 0 to 6 [ 351.641869][T19528] loop1: detected capacity change from 0 to 16 [ 351.646588][T19524] FAT-fs (loop3): Directory bread(block 6) failed [ 351.654856][T19529] usb usb9: usbfs: process 19529 (syz-executor.4) did not claim interface 0 before use 12:14:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(0x0, 0x4000000000000073, 0x68001) 12:14:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffff7f00, 0x0) [ 351.673137][ T37] audit: type=1804 audit(1630757674.765:266): pid=19526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/139/bus" dev="sda1" ino=14734 res=1 errno=0 [ 351.702974][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc020660b, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 351.730315][T19534] FAT-fs (loop3): Directory bread(block 6) failed [ 351.740119][T19526] FAULT_INJECTION: forcing a failure. [ 351.740119][T19526] name failslab, interval 1, probability 0, space 0, times 0 [ 351.782983][T19526] CPU: 0 PID: 19526 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 351.791612][T19526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.802453][T19526] Call Trace: [ 351.805725][T19526] dump_stack_lvl+0xcd/0x134 [ 351.810675][T19526] should_fail.cold+0x5/0xa [ 351.815183][T19526] ? alloc_pipe_info+0x105/0x590 [ 351.820119][T19526] should_failslab+0x5/0x10 [ 351.824626][T19526] kmem_cache_alloc_trace+0x55/0x3c0 [ 351.830015][T19526] alloc_pipe_info+0x105/0x590 [ 351.834362][T19547] usb usb9: usbfs: process 19547 (syz-executor.4) did not claim interface 0 before use [ 351.834778][T19526] splice_direct_to_actor+0x6f1/0x8c0 [ 351.849753][T19526] ? lock_release+0x522/0x720 [ 351.854780][T19526] ? generic_file_splice_read+0x6d0/0x6d0 [ 351.860588][T19526] ? apparmor_file_permission+0x264/0x4e0 [ 351.866311][T19526] ? do_splice_to+0x250/0x250 [ 351.870985][T19526] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 351.877232][T19526] ? security_file_permission+0xab/0xd0 [ 351.882782][T19526] do_splice_direct+0x1b3/0x280 [ 351.887632][T19526] ? splice_direct_to_actor+0x8c0/0x8c0 [ 351.893176][T19526] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 351.899616][T19526] ? security_file_permission+0xab/0xd0 [ 351.905251][T19526] do_sendfile+0xae9/0x1240 [ 351.909759][T19526] ? do_pwritev+0x270/0x270 [ 351.914261][T19526] ? rcu_read_lock_sched_held+0xd/0x70 [ 351.919726][T19526] ? lock_release+0x522/0x720 [ 351.924492][T19526] ? __context_tracking_exit+0xb8/0xe0 [ 351.929995][T19526] ? lock_downgrade+0x6e0/0x6e0 [ 351.934864][T19526] ? lock_downgrade+0x6e0/0x6e0 [ 351.939727][T19526] __x64_sys_sendfile64+0x1cc/0x210 [ 351.945142][T19526] ? __ia32_sys_sendfile+0x220/0x220 [ 351.948969][T19554] loop4: detected capacity change from 0 to 264192 [ 351.950465][T19526] ? syscall_enter_from_user_mode+0x21/0x70 [ 351.950494][T19526] do_syscall_64+0x35/0xb0 [ 351.967318][T19526] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 351.973217][T19526] RIP: 0033:0x4665f9 [ 351.977110][T19526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 351.996988][T19526] RSP: 002b:00007f7a560ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 352.005408][T19526] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 352.013381][T19526] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000007 [ 352.021352][T19526] RBP: 00007f7a560ec1d0 R08: 0000000000000000 R09: 0000000000000000 12:14:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x48000000, 0x0) 12:14:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc028660f, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:35 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x50009401, &(0x7f00000005c0)={{}, "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"}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r1, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000100)=0x4) syz_mount_image$nfs4(0x0, 0x0, 0x3, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000580)="de51f5e76676db75fb", 0x9, 0x80000000}, {&(0x7f0000000080)="0d0b4fc34ad5dc11011128e78a049abcb6", 0x11, 0xffffffffffff0001}], 0x810844, 0x0) 12:14:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x3, 0x1}}, 0x0, 0x0, 0x0}) 12:14:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x5, 0x1}}, 0x0, 0x0, 0x0}) [ 352.029327][T19526] R10: 2000800100020004 R11: 0000000000000246 R12: 0000000000000001 [ 352.037502][T19526] R13: 00007ffdee0bffcf R14: 00007f7a560ec300 R15: 0000000000022000 [ 352.051171][ T37] audit: type=1804 audit(1630757675.145:267): pid=19543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/139/bus" dev="sda1" ino=14734 res=1 errno=0 12:14:35 executing program 2 (fault-call:12 fault-nth:1): r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x68001) [ 352.082982][T19562] loop1: detected capacity change from 0 to 16 12:14:35 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x173, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x46e}]}) fsmount(0xffffffffffffffff, 0x1, 0xc) 12:14:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x7, 0x1}}, 0x0, 0x0, 0x0}) 12:14:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffff8000, 0x0) 12:14:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x68001) [ 352.162488][T19575] loop3: detected capacity change from 0 to 6 [ 352.180808][ T37] audit: type=1804 audit(1630757675.275:268): pid=19576 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/140/bus" dev="sda1" ino=14699 res=1 errno=0 [ 352.212750][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 352.227873][T19575] FAT-fs (loop3): Directory bread(block 6) failed [ 352.240168][T19575] FAT-fs (loop3): Directory bread(block 6) failed [ 352.255351][T19576] FAULT_INJECTION: forcing a failure. [ 352.255351][T19576] name failslab, interval 1, probability 0, space 0, times 0 12:14:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x4c000000, 0x0) 12:14:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x8, 0x1}}, 0x0, 0x0, 0x0}) 12:14:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x0, 0x68001) 12:14:35 executing program 4: gettid() ptrace(0x10, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4a, 0x80, 0x1f, 0x1, 0x0, 0x4d93, 0x802, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0xc447, 0x3}, 0x0, 0x1b, 0xb77e, 0x1, 0x3, 0x8, 0x4, 0x0, 0x6, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, r1, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001c80)=""/171, 0xab}], 0x1, 0xfffffffe, 0x6) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x40, 0x0, 0x1, 0x1, 0x0, 0x0, 0x112, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xae5, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x382, 0x2, 0x2, 0x9, 0x5, 0x1ff, 0xfffa, 0x0, 0x8000, 0x0, 0x9}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x2}, 0x8) setsockopt$inet_int(r2, 0x0, 0x7, &(0x7f0000000040)=0x1000, 0x4) sched_setattr(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001", 0xca, 0x10000}, {0x0}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b}, {&(0x7f0000011c00)="0000010000000000000000000000000000000300000000000000001000"/41, 0x29, 0x500840}, {&(0x7f0000011d00), 0x0, 0x5008e0}, {0x0}, {0x0}, {&(0x7f0000013300)}, {0x0}, {&(0x7f0000015600)}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f0000001080)=ANY=[]) getxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=@known='security.selinux\x00', &(0x7f0000000380)=""/167, 0xa7) [ 352.305196][T19576] CPU: 0 PID: 19576 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 352.313758][T19576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.323875][T19576] Call Trace: [ 352.327427][T19576] dump_stack_lvl+0xcd/0x134 [ 352.332051][T19576] should_fail.cold+0x5/0xa [ 352.336580][T19576] ? alloc_pipe_info+0x1e0/0x590 [ 352.341558][T19576] should_failslab+0x5/0x10 [ 352.341925][T19595] loop1: detected capacity change from 0 to 16 [ 352.346111][T19576] __kmalloc+0x72/0x330 [ 352.346141][T19576] alloc_pipe_info+0x1e0/0x590 [ 352.346162][T19576] splice_direct_to_actor+0x6f1/0x8c0 [ 352.346181][T19576] ? lock_release+0x522/0x720 [ 352.371294][T19576] ? generic_file_splice_read+0x6d0/0x6d0 [ 352.377035][T19576] ? apparmor_file_permission+0x264/0x4e0 [ 352.382811][T19576] ? do_splice_to+0x250/0x250 [ 352.387501][T19576] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 352.393760][T19576] ? security_file_permission+0xab/0xd0 [ 352.399326][T19576] do_splice_direct+0x1b3/0x280 [ 352.404190][T19576] ? splice_direct_to_actor+0x8c0/0x8c0 [ 352.409773][T19576] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 352.416030][T19576] ? security_file_permission+0xab/0xd0 [ 352.421597][T19576] do_sendfile+0xae9/0x1240 [ 352.426127][T19576] ? do_pwritev+0x270/0x270 [ 352.430640][T19576] ? rcu_read_lock_sched_held+0xd/0x70 [ 352.436549][T19576] ? lock_release+0x522/0x720 [ 352.441274][T19576] ? __context_tracking_exit+0xb8/0xe0 [ 352.447105][T19576] ? lock_downgrade+0x6e0/0x6e0 [ 352.452357][T19576] ? lock_downgrade+0x6e0/0x6e0 [ 352.457226][T19576] __x64_sys_sendfile64+0x1cc/0x210 [ 352.462455][T19576] ? __ia32_sys_sendfile+0x220/0x220 [ 352.468027][T19576] ? syscall_enter_from_user_mode+0x21/0x70 [ 352.473945][T19576] do_syscall_64+0x35/0xb0 [ 352.478416][T19576] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 352.484328][T19576] RIP: 0033:0x4665f9 [ 352.488224][T19576] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 352.508118][T19576] RSP: 002b:00007f7a560ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 352.517065][T19576] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 352.525048][T19576] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000007 [ 352.533067][T19576] RBP: 00007f7a560ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 352.541049][T19576] R10: 2000800100020004 R11: 0000000000000246 R12: 0000000000000001 [ 352.549119][T19576] R13: 00007ffdee0bffcf R14: 00007f7a560ec300 R15: 0000000000022000 [ 352.558578][ T37] audit: type=1804 audit(1630757675.405:269): pid=19592 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/140/bus" dev="sda1" ino=14699 res=1 errno=0 12:14:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffffc000, 0x0) 12:14:35 executing program 2 (fault-call:12 fault-nth:2): r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) [ 352.678813][T19610] loop3: detected capacity change from 0 to 6 [ 352.683173][T19607] loop4: detected capacity change from 0 to 20751 [ 352.685316][ T26] Bluetooth: hci3: command 0x040f tx timeout [ 352.731852][T19610] FAT-fs (loop3): Directory bread(block 6) failed [ 352.739366][T19622] loop1: detected capacity change from 0 to 16 [ 352.745976][T19607] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop4 scanned by syz-executor.4 (19607) [ 352.764770][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x9, 0x1}}, 0x0, 0x0, 0x0}) 12:14:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfffff000, 0x0) [ 352.769105][ T37] audit: type=1804 audit(1630757675.855:270): pid=19624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/141/bus" dev="sda1" ino=14744 res=1 errno=0 [ 352.778402][T19624] FAULT_INJECTION: forcing a failure. [ 352.778402][T19624] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 352.817162][T19625] FAT-fs (loop3): Directory bread(block 6) failed [ 352.850616][T19624] CPU: 1 PID: 19624 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 352.859091][T19624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.869156][T19624] Call Trace: [ 352.872447][T19624] dump_stack_lvl+0xcd/0x134 [ 352.877064][T19624] should_fail.cold+0x5/0xa [ 352.881592][T19624] prepare_alloc_pages+0x17b/0x580 [ 352.886722][T19624] __alloc_pages+0x12f/0x500 [ 352.891427][T19624] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 352.892377][ T37] audit: type=1804 audit(1630757675.935:271): pid=19630 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/141/bus" dev="sda1" ino=14744 res=1 errno=0 [ 352.898208][T19624] ? lock_downgrade+0x6e0/0x6e0 [ 352.898237][T19624] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 352.898264][T19624] alloc_pages+0x1a7/0x300 [ 352.898287][T19624] __page_cache_alloc+0x303/0x3a0 [ 352.898308][T19624] ? rcu_read_lock_sched_held+0xd/0x70 [ 352.898328][T19624] page_cache_ra_unbounded+0x363/0x950 [ 352.898354][T19624] ? read_pages+0x8d0/0x8d0 [ 352.959037][T19624] ? lock_downgrade+0x6e0/0x6e0 [ 352.963904][T19624] ondemand_readahead+0x61e/0x11d0 [ 352.969033][T19624] page_cache_sync_ra+0x1cb/0x200 [ 352.974158][T19624] filemap_get_pages+0x2a6/0x1870 [ 352.979199][T19624] ? lock_acquire+0x442/0x510 [ 352.983884][T19624] ? lock_release+0x522/0x720 [ 352.988573][T19624] ? is_bpf_text_address+0x77/0x170 [ 352.993783][T19624] ? __lock_page_async+0x4d0/0x4d0 12:14:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x14, 0x1}}, 0x0, 0x0, 0x0}) [ 352.998915][T19624] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 353.004663][T19624] filemap_read+0x2ca/0xe50 [ 353.009406][T19624] ? __kernel_text_address+0x9/0x30 [ 353.014626][T19624] ? lock_acquire+0x442/0x510 [ 353.019314][T19624] ? filemap_get_pages+0x1870/0x1870 [ 353.024639][T19624] ? apparmor_socket_post_create+0x90/0xf10 [ 353.030531][T19624] ? lock_downgrade+0x6e0/0x6e0 [ 353.035383][T19624] generic_file_read_iter+0x397/0x4f0 [ 353.041102][T19624] ? rcu_read_lock_sched_held+0xd/0x70 [ 353.046552][T19624] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 353.052790][T19624] ? __fsnotify_parent+0x488/0x9d0 [ 353.057904][T19624] ext4_file_read_iter+0x1d4/0x5d0 [ 353.063114][T19624] generic_file_splice_read+0x453/0x6d0 [ 353.068749][T19624] ? do_splice_direct+0x280/0x280 [ 353.073780][T19624] ? security_file_permission+0xab/0xd0 [ 353.079322][T19624] ? do_splice_direct+0x280/0x280 [ 353.084341][T19624] do_splice_to+0x1bf/0x250 [ 353.088838][T19624] splice_direct_to_actor+0x2c2/0x8c0 [ 353.094198][T19624] ? generic_file_splice_read+0x6d0/0x6d0 [ 353.099925][T19624] ? do_splice_to+0x250/0x250 [ 353.104591][T19624] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 353.110821][T19624] ? security_file_permission+0xab/0xd0 [ 353.116360][T19624] do_splice_direct+0x1b3/0x280 [ 353.121311][T19624] ? splice_direct_to_actor+0x8c0/0x8c0 [ 353.126846][T19624] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 353.133085][T19624] ? security_file_permission+0xab/0xd0 [ 353.138630][T19624] do_sendfile+0xae9/0x1240 [ 353.143133][T19624] ? do_pwritev+0x270/0x270 [ 353.147718][T19624] ? rcu_read_lock_sched_held+0xd/0x70 [ 353.153172][T19624] ? lock_release+0x522/0x720 [ 353.157953][T19624] ? __context_tracking_exit+0xb8/0xe0 [ 353.163408][T19624] ? lock_downgrade+0x6e0/0x6e0 [ 353.168254][T19624] ? lock_downgrade+0x6e0/0x6e0 [ 353.173100][T19624] __x64_sys_sendfile64+0x1cc/0x210 [ 353.178294][T19624] ? __ia32_sys_sendfile+0x220/0x220 [ 353.183597][T19624] ? syscall_enter_from_user_mode+0x21/0x70 [ 353.189485][T19624] do_syscall_64+0x35/0xb0 [ 353.193917][T19624] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 353.200000][T19624] RIP: 0033:0x4665f9 [ 353.203882][T19624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 353.223483][T19624] RSP: 002b:00007f7a560ec188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 353.231892][T19624] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 353.239856][T19624] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000007 12:14:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x60000000, 0x0) 12:14:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) [ 353.247822][T19624] RBP: 00007f7a560ec1d0 R08: 0000000000000000 R09: 0000000000000000 [ 353.255878][T19624] R10: 2000800100020004 R11: 0000000000000246 R12: 0000000000000001 [ 353.263852][T19624] R13: 00007ffdee0bffcf R14: 00007f7a560ec300 R15: 0000000000022000 [ 353.284543][T19607] BTRFS error (device loop4): superblock checksum mismatch 12:14:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) [ 353.343113][T19607] BTRFS error (device loop4): open_ctree failed [ 353.360533][T19642] loop1: detected capacity change from 0 to 16 12:14:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x2c, 0x1}}, 0x0, 0x0, 0x0}) 12:14:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfffffdff, 0x0) [ 353.406136][T19654] loop3: detected capacity change from 0 to 6 [ 353.432901][T19654] FAT-fs (loop3): Directory bread(block 6) failed 12:14:36 executing program 0 (fault-call:3 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:36 executing program 4: gettid() ptrace(0x10, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4a, 0x80, 0x1f, 0x1, 0x0, 0x4d93, 0x802, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0xc447, 0x3}, 0x0, 0x1b, 0xb77e, 0x1, 0x3, 0x8, 0x4, 0x0, 0x6, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, r1, 0x1) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000001c80)=""/171, 0xab}], 0x1, 0xfffffffe, 0x6) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x40, 0x0, 0x1, 0x1, 0x0, 0x0, 0x112, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xae5, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x382, 0x2, 0x2, 0x9, 0x5, 0x1ff, 0xfffa, 0x0, 0x8000, 0x0, 0x9}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x2}, 0x8) setsockopt$inet_int(r2, 0x0, 0x7, &(0x7f0000000040)=0x1000, 0x4) sched_setattr(0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004503000000000000000000000001", 0xca, 0x10000}, {0x0}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b}, {&(0x7f0000011c00)="0000010000000000000000000000000000000300000000000000001000"/41, 0x29, 0x500840}, {&(0x7f0000011d00), 0x0, 0x5008e0}, {0x0}, {0x0}, {&(0x7f0000013300)}, {0x0}, {&(0x7f0000015600)}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f0000001080)=ANY=[]) getxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=@known='security.selinux\x00', &(0x7f0000000380)=""/167, 0xa7) [ 353.451847][T19654] FAT-fs (loop3): Directory bread(block 6) failed [ 353.530689][T19670] FAULT_INJECTION: forcing a failure. [ 353.530689][T19670] name failslab, interval 1, probability 0, space 0, times 0 [ 353.541353][T19672] loop4: detected capacity change from 0 to 20751 [ 353.546524][T19671] loop1: detected capacity change from 0 to 16 [ 353.573404][T19670] CPU: 1 PID: 19670 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 353.581842][T19670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.591971][T19670] Call Trace: [ 353.595237][T19670] dump_stack_lvl+0xcd/0x134 [ 353.599823][T19670] should_fail.cold+0x5/0xa [ 353.604318][T19670] ? getname_flags.part.0+0x50/0x4f0 [ 353.609592][T19670] should_failslab+0x5/0x10 [ 353.614083][T19670] kmem_cache_alloc+0x5e/0x4a0 [ 353.618833][T19670] ? lock_downgrade+0x6e0/0x6e0 [ 353.623671][T19670] getname_flags.part.0+0x50/0x4f0 [ 353.628788][T19670] getname+0x8e/0xd0 [ 353.632669][T19670] do_sys_openat2+0xf5/0x4d0 [ 353.637241][T19670] ? build_open_flags+0x6f0/0x6f0 [ 353.643448][T19670] ? lock_acquire+0x442/0x510 [ 353.648149][T19670] ? lock_release+0x522/0x720 [ 353.652816][T19670] ? __context_tracking_exit+0xb8/0xe0 [ 353.658263][T19670] ? lock_downgrade+0x6e0/0x6e0 [ 353.663105][T19670] __x64_sys_openat+0x13f/0x1f0 [ 353.667945][T19670] ? __ia32_sys_open+0x1c0/0x1c0 [ 353.673023][T19670] ? syscall_enter_from_user_mode+0x21/0x70 [ 353.678914][T19670] do_syscall_64+0x35/0xb0 [ 353.683431][T19670] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 353.689316][T19670] RIP: 0033:0x4196e4 [ 353.693193][T19670] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 353.712788][T19670] RSP: 002b:00007f15e1a3dcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 353.721360][T19670] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004196e4 [ 353.729318][T19670] RDX: 0000000000068001 RSI: 00007f15e1a3dd60 RDI: 00000000ffffff9c [ 353.737275][T19670] RBP: 00007f15e1a3dd60 R08: 0000000000000000 R09: 0000000000000000 [ 353.745336][T19670] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000068001 [ 353.753306][T19670] R13: 00007ffd6a6feacf R14: 00007f15e1a3e300 R15: 0000000000022000 12:14:36 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:36 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x53, 0x1}}, 0x0, 0x0, 0x0}) 12:14:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x68000000, 0x0) 12:14:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffffff0f, 0x0) [ 353.787411][T19672] BTRFS error (device loop4): superblock checksum mismatch [ 353.796811][T19672] BTRFS error (device loop4): open_ctree failed [ 353.854367][T19688] loop3: detected capacity change from 0 to 6 [ 353.867407][T19688] FAT-fs (loop3): Directory bread(block 6) failed 12:14:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x63, 0x1}}, 0x0, 0x0, 0x0}) 12:14:37 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000000180)={[{@fsync_mode_strict}]}) exit_group(0x6) clone(0x4000800, &(0x7f0000000040)="dc7c2622", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)="4907ea5ada44394bf8e20f30838f7925b2448df6ae2a1e9ea4f02976aaca1b7dee4ad2fe5c005ab4647eb73ce8439e24f735ca86814c1ace84b4e3a06f111c0f58a75786c2c7f1ee9a0514444884bdd60c29405630818abb742b9f7472daf56b8145e6bde7bea32f71") socket$nl_route(0x10, 0x3, 0x0) [ 353.896495][T19688] FAT-fs (loop3): Directory bread(block 6) failed [ 353.907082][T19698] loop1: detected capacity change from 0 to 16 12:14:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x6c000000, 0x0) [ 353.930848][ T37] audit: type=1804 audit(1630757677.025:272): pid=19700 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/142/bus" dev="sda1" ino=14318 res=1 errno=0 [ 353.944954][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffffff8c, 0x0) 12:14:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x6c, 0x1}}, 0x0, 0x0, 0x0}) [ 354.019221][T19706] loop4: detected capacity change from 0 to 12 [ 354.057718][T19706] F2FS-fs (loop4): Unable to read 2th superblock 12:14:37 executing program 0 (fault-call:3 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 354.067130][T19715] loop3: detected capacity change from 0 to 6 12:14:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 354.098672][T19706] attempt to access beyond end of device [ 354.098672][T19706] loop4: rw=12288, want=4104, limit=12 [ 354.110626][T19715] FAT-fs (loop3): Directory bread(block 6) failed [ 354.127280][T19706] attempt to access beyond end of device [ 354.127280][T19706] loop4: rw=12288, want=8200, limit=12 12:14:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x74000000, 0x0) [ 354.143885][T19715] FAT-fs (loop3): Directory bread(block 6) failed [ 354.161460][T19706] F2FS-fs (loop4): Failed to get valid F2FS checkpoint [ 354.163276][T19728] loop1: detected capacity change from 0 to 16 [ 354.171242][T19727] FAULT_INJECTION: forcing a failure. [ 354.171242][T19727] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 354.206046][T19731] usb usb9: usbfs: process 19731 (syz-executor.5) did not claim interface 0 before use [ 354.211598][T19727] CPU: 0 PID: 19727 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 354.224111][T19727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.231873][T19733] usb usb9: usbfs: process 19733 (syz-executor.5) did not claim interface 0 before use [ 354.234159][T19727] Call Trace: [ 354.234166][T19727] dump_stack_lvl+0xcd/0x134 [ 354.234193][T19727] should_fail.cold+0x5/0xa [ 354.256339][T19727] strncpy_from_user+0x34/0x3e0 [ 354.261196][T19727] getname_flags.part.0+0x95/0x4f0 [ 354.266324][T19727] getname+0x8e/0xd0 [ 354.270243][T19727] do_sys_openat2+0xf5/0x4d0 [ 354.274839][T19727] ? build_open_flags+0x6f0/0x6f0 [ 354.280054][T19727] ? lock_acquire+0x442/0x510 [ 354.284738][T19727] ? lock_release+0x522/0x720 [ 354.289501][T19727] ? __context_tracking_exit+0xb8/0xe0 [ 354.294960][T19727] ? lock_downgrade+0x6e0/0x6e0 [ 354.299811][T19727] __x64_sys_openat+0x13f/0x1f0 [ 354.304660][T19727] ? __ia32_sys_open+0x1c0/0x1c0 [ 354.309601][T19727] ? syscall_enter_from_user_mode+0x21/0x70 [ 354.315495][T19727] do_syscall_64+0x35/0xb0 [ 354.319915][T19727] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 354.325814][T19727] RIP: 0033:0x4196e4 [ 354.329703][T19727] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 354.349516][T19727] RSP: 002b:00007f15e1a3dcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 354.357941][T19727] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004196e4 [ 354.365914][T19727] RDX: 0000000000068001 RSI: 00007f15e1a3dd60 RDI: 00000000ffffff9c [ 354.376168][T19727] RBP: 00007f15e1a3dd60 R08: 0000000000000000 R09: 0000000000000000 [ 354.384192][T19727] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000068001 [ 354.392149][T19727] R13: 00007ffd6a6feacf R14: 00007f15e1a3e300 R15: 0000000000022000 [ 354.441904][T19741] loop3: detected capacity change from 0 to 6 [ 354.452760][T19741] FAT-fs (loop3): Directory bread(block 6) failed [ 354.470156][T19741] FAT-fs (loop3): Directory bread(block 6) failed 12:14:37 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020008) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffffffe5, 0x0) 12:14:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x2, 0x0, 0x0}) 12:14:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 12:14:37 executing program 0 (fault-call:3 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:37 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x7a000000, 0x0) [ 354.764328][ T8952] Bluetooth: hci3: command 0x0419 tx timeout [ 354.839455][T19765] usb usb9: usbfs: process 19765 (syz-executor.4) did not claim interface 0 before use [ 354.848080][T19769] FAULT_INJECTION: forcing a failure. [ 354.848080][T19769] name failslab, interval 1, probability 0, space 0, times 0 [ 354.850657][T19770] loop3: detected capacity change from 0 to 6 [ 354.871216][T19768] loop1: detected capacity change from 0 to 16 [ 354.880676][T19767] usb usb9: usbfs: process 19767 (syz-executor.5) did not claim interface 0 before use [ 354.900152][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 354.903558][ T37] kauditd_printk_skb: 1 callbacks suppressed [ 354.903570][ T37] audit: type=1804 audit(1630757677.995:274): pid=19772 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/143/bus" dev="sda1" ino=14750 res=1 errno=0 [ 354.917011][T19769] CPU: 0 PID: 19769 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 354.929914][T19770] FAT-fs (loop3): Directory bread(block 6) failed [ 354.942310][T19769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.942323][T19769] Call Trace: [ 354.942329][T19769] dump_stack_lvl+0xcd/0x134 [ 354.954534][T19770] FAT-fs (loop3): Directory bread(block 6) failed [ 354.957123][T19769] should_fail.cold+0x5/0xa [ 354.957152][T19769] ? __alloc_file+0x21/0x280 [ 354.990569][T19769] should_failslab+0x5/0x10 [ 354.995081][T19769] kmem_cache_alloc+0x5e/0x4a0 [ 354.999850][T19769] __alloc_file+0x21/0x280 [ 355.004269][T19769] alloc_empty_file+0x6d/0x170 [ 355.009121][T19769] path_openat+0xe4/0x2740 [ 355.013710][T19769] ? kasan_save_stack+0x1b/0x40 [ 355.018561][T19769] ? __kasan_slab_alloc+0x83/0xb0 [ 355.023587][T19769] ? kmem_cache_alloc+0x285/0x4a0 [ 355.028874][T19769] ? getname_flags.part.0+0x50/0x4f0 [ 355.034246][T19769] ? getname+0x8e/0xd0 [ 355.038400][T19769] ? do_sys_openat2+0xf5/0x4d0 [ 355.043166][T19769] ? __x64_sys_openat+0x13f/0x1f0 [ 355.048184][T19769] ? do_syscall_64+0x35/0xb0 [ 355.052777][T19769] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 355.059018][T19769] ? __zone_watermark_ok+0x450/0x450 [ 355.064392][T19769] ? __filename_lookup+0x590/0x590 [ 355.069513][T19769] ? lock_acquire+0x442/0x510 [ 355.074188][T19769] ? rcu_read_lock_sched_held+0xd/0x70 [ 355.079643][T19769] ? lock_acquire+0x442/0x510 [ 355.084319][T19769] ? rcu_read_lock_sched_held+0xd/0x70 [ 355.089778][T19769] ? lock_release+0x522/0x720 [ 355.094625][T19769] ? __might_fault+0xd3/0x180 [ 355.099303][T19769] do_filp_open+0x1aa/0x400 [ 355.103812][T19769] ? may_open_dev+0xf0/0xf0 [ 355.108315][T19769] ? lock_release+0x522/0x720 [ 355.112990][T19769] ? alloc_fd+0x2f0/0x670 [ 355.117322][T19769] ? lock_downgrade+0x6e0/0x6e0 [ 355.122169][T19769] ? rwlock_bug.part.0+0x90/0x90 [ 355.127134][T19769] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 355.133462][T19769] ? _find_next_bit+0x1e3/0x260 [ 355.138401][T19769] ? _raw_spin_unlock+0x24/0x40 [ 355.143355][T19769] ? alloc_fd+0x2f0/0x670 [ 355.147683][T19769] do_sys_openat2+0x16d/0x4d0 [ 355.152360][T19769] ? build_open_flags+0x6f0/0x6f0 [ 355.157381][T19769] ? lock_acquire+0x442/0x510 [ 355.162064][T19769] ? lock_release+0x522/0x720 [ 355.166740][T19769] ? __context_tracking_exit+0xb8/0xe0 [ 355.172195][T19769] ? lock_downgrade+0x6e0/0x6e0 [ 355.177046][T19769] __x64_sys_openat+0x13f/0x1f0 [ 355.181983][T19769] ? __ia32_sys_open+0x1c0/0x1c0 [ 355.186921][T19769] ? syscall_enter_from_user_mode+0x21/0x70 [ 355.192814][T19769] do_syscall_64+0x35/0xb0 [ 355.197234][T19769] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 355.203216][T19769] RIP: 0033:0x4196e4 [ 355.207108][T19769] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 355.226713][T19769] RSP: 002b:00007f15e1a3dcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 12:14:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe5ffffff, 0x0) 12:14:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffc}, 0x6e) setrlimit(0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getpriority(0x0, 0x0) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x80019e) getpgrp(0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x4e141, 0x0) unshare(0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./bus\x00'}, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0xc140, 0x0) sendfile(r4, r5, 0x0, 0x401ffc000) 12:14:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfffffff6, 0x0) [ 355.235211][T19769] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004196e4 [ 355.243478][T19769] RDX: 0000000000068001 RSI: 00007f15e1a3dd60 RDI: 00000000ffffff9c [ 355.251456][T19769] RBP: 00007f15e1a3dd60 R08: 0000000000000000 R09: 0000000000000000 [ 355.259430][T19769] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000068001 [ 355.267398][T19769] R13: 00007ffd6a6feacf R14: 00007f15e1a3e300 R15: 0000000000022000 12:14:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf6ffffff, 0x0) [ 355.315229][ T37] audit: type=1804 audit(1630757678.415:275): pid=19786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/143/bus" dev="sda1" ino=14750 res=1 errno=0 12:14:38 executing program 0 (fault-call:3 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x3, 0x0, 0x0}) [ 355.699545][ T37] audit: type=1804 audit(1630757678.475:276): pid=19786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/143/bus" dev="sda1" ino=14750 res=1 errno=0 [ 355.731518][ T37] audit: type=1804 audit(1630757678.555:277): pid=19794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir048115300/syzkaller.v464Vw/15/bus" dev="sda1" ino=14703 res=1 errno=0 [ 355.739795][T19801] FAULT_INJECTION: forcing a failure. [ 355.739795][T19801] name failslab, interval 1, probability 0, space 0, times 0 [ 355.773064][T19800] loop1: detected capacity change from 0 to 16 [ 355.778511][T19801] CPU: 0 PID: 19801 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 355.787645][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.797694][T19801] Call Trace: [ 355.801139][T19801] dump_stack_lvl+0xcd/0x134 [ 355.805738][T19801] should_fail.cold+0x5/0xa [ 355.810288][T19801] ? security_file_alloc+0x34/0x170 [ 355.815575][T19801] should_failslab+0x5/0x10 [ 355.820085][T19801] kmem_cache_alloc+0x5e/0x4a0 [ 355.824855][T19801] security_file_alloc+0x34/0x170 [ 355.828750][ T37] audit: type=1800 audit(1630757678.555:278): pid=19794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14703 res=0 errno=0 [ 355.829876][T19801] __alloc_file+0xd8/0x280 [ 355.829900][T19801] alloc_empty_file+0x6d/0x170 [ 355.860005][T19801] path_openat+0xe4/0x2740 [ 355.864425][T19801] ? kasan_save_stack+0x1b/0x40 [ 355.869287][T19801] ? __kasan_slab_alloc+0x83/0xb0 [ 355.874314][T19801] ? kmem_cache_alloc+0x285/0x4a0 [ 355.879338][T19801] ? getname_flags.part.0+0x50/0x4f0 [ 355.884655][T19801] ? getname+0x8e/0xd0 [ 355.888725][T19801] ? do_sys_openat2+0xf5/0x4d0 [ 355.893487][T19801] ? __x64_sys_openat+0x13f/0x1f0 [ 355.898508][T19801] ? do_syscall_64+0x35/0xb0 [ 355.903184][T19801] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 355.909252][T19801] ? rcu_read_lock_sched_held+0xd/0x70 [ 355.914796][T19801] ? __filename_lookup+0x590/0x590 [ 355.919905][T19801] ? lock_downgrade+0x6e0/0x6e0 [ 355.924752][T19801] ? rcu_read_lock_sched_held+0xd/0x70 [ 355.930209][T19801] ? lock_acquire+0x442/0x510 [ 355.934881][T19801] ? rcu_read_lock_sched_held+0xd/0x70 [ 355.940340][T19801] ? lock_release+0x522/0x720 [ 355.945125][T19801] do_filp_open+0x1aa/0x400 [ 355.949631][T19801] ? may_open_dev+0xf0/0xf0 [ 355.954132][T19801] ? lock_release+0x522/0x720 [ 355.958808][T19801] ? alloc_fd+0x2f0/0x670 [ 355.963159][T19801] ? lock_downgrade+0x6e0/0x6e0 [ 355.968011][T19801] ? rwlock_bug.part.0+0x90/0x90 [ 355.972949][T19801] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 355.979202][T19801] ? _find_next_bit+0x1e3/0x260 [ 355.984056][T19801] ? _raw_spin_unlock+0x24/0x40 [ 355.988907][T19801] ? alloc_fd+0x2f0/0x670 [ 355.993236][T19801] do_sys_openat2+0x16d/0x4d0 [ 355.998000][T19801] ? build_open_flags+0x6f0/0x6f0 [ 356.003021][T19801] ? lock_release+0x522/0x720 [ 356.007698][T19801] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 356.014115][T19801] ? trace_hardirqs_off+0x6b/0x1b0 [ 356.019230][T19801] __x64_sys_openat+0x13f/0x1f0 [ 356.024078][T19801] ? __ia32_sys_open+0x1c0/0x1c0 [ 356.029102][T19801] ? trace_hardirqs_on+0x51/0x1c0 [ 356.034123][T19801] ? syscall_enter_from_user_mode+0x21/0x70 [ 356.040015][T19801] ? syscall_enter_from_user_mode+0x2b/0x70 [ 356.045907][T19801] do_syscall_64+0x35/0xb0 [ 356.050340][T19801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 356.056234][T19801] RIP: 0033:0x4196e4 [ 356.060123][T19801] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 356.079727][T19801] RSP: 002b:00007f15e1a3dcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 356.088140][T19801] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004196e4 12:14:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfffffffe, 0x0) 12:14:39 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x200080010002000f) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 356.096194][T19801] RDX: 0000000000068001 RSI: 00007f15e1a3dd60 RDI: 00000000ffffff9c [ 356.104644][T19801] RBP: 00007f15e1a3dd60 R08: 0000000000000000 R09: 0000000000000000 [ 356.112611][T19801] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000068001 [ 356.120573][T19801] R13: 00007ffd6a6feacf R14: 00007f15e1a3e300 R15: 0000000000022000 [ 356.145545][T19803] loop3: detected capacity change from 0 to 6 [ 356.239556][T19803] FAT-fs (loop3): Directory bread(block 6) failed [ 356.263991][ T37] audit: type=1804 audit(1630757679.325:279): pid=19817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir048115300/syzkaller.v464Vw/15/bus" dev="sda1" ino=14703 res=1 errno=0 12:14:39 executing program 4: sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x0, 0x10, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x6, 0x3c}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x3d}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x42}]}, 0x38}, 0x1, 0x0, 0x0, 0xc0}, 0x4000000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') close(r0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f0000000780)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x64, r4, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x11}, @NLBL_MGMT_A_CV4DOI={0x8}, @NLBL_MGMT_A_DOMAIN={0xc, 0x1, 'syztnl0\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1d}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x4042040) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f0000000440)={'sit0\x00', 0x0, 0x4, 0x5, 0x0, 0x0, 0x1, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x20, 0x1, 0x7f, 0x2c0c}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002cbd7000fedbdf25080000004c00018008000100", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="1400020076657468315f746f5f626f6e6400000008000300020000001400020076657468315f746f5f6261746164760008000100", @ANYRES32=r5, @ANYBLOB="9101f51f5c871ad4c6225a109d83ad76f316b853565de3b8b355a07bf77b7dd62075b78cb131fcd38d8bf4842a12920c701a7282a7adad46330c173ec89b2dd1ef82a1c8455fe90db9e8bc192715ff1b80f358714b54d1a45c5f127a8cffee5c9c0cd09ee763ece4f9852d575d2b23f47849ea7000499a5dd94d3e39df7a5cb1"], 0x60}}, 0xbc32a2200fa51056) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000007c0)={0x0, 0x3, 0x4, 0x1}, 0x8) 12:14:39 executing program 0 (fault-call:3 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 356.347241][T19805] usb usb9: usbfs: process 19805 (syz-executor.5) did not claim interface 0 before use [ 356.357635][ T37] audit: type=1800 audit(1630757679.325:280): pid=19817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=14703 res=0 errno=0 12:14:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfeffffff, 0x0) [ 356.445266][ T37] audit: type=1804 audit(1630757679.545:281): pid=19820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/144/bus" dev="sda1" ino=14723 res=1 errno=0 12:14:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x4, 0x0, 0x0}) [ 356.487265][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 356.494071][T19821] loop1: detected capacity change from 0 to 16 [ 356.537237][T19827] loop4: detected capacity change from 0 to 4 [ 356.544901][T19828] FAULT_INJECTION: forcing a failure. [ 356.544901][T19828] name failslab, interval 1, probability 0, space 0, times 0 [ 356.578364][T19836] usb usb9: usbfs: process 19836 (syz-executor.5) did not claim interface 0 before use [ 356.578821][T19839] loop3: detected capacity change from 0 to 6 [ 356.595126][ T37] audit: type=1804 audit(1630757679.675:282): pid=19838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/144/bus" dev="sda1" ino=14723 res=1 errno=0 [ 356.628872][T19828] CPU: 0 PID: 19828 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 356.637304][T19828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.647361][T19828] Call Trace: [ 356.650640][T19828] dump_stack_lvl+0xcd/0x134 [ 356.655238][T19828] should_fail.cold+0x5/0xa [ 356.659761][T19828] ? tomoyo_realpath_from_path+0xc3/0x620 [ 356.665470][T19828] should_failslab+0x5/0x10 [ 356.669964][T19828] __kmalloc+0x72/0x330 [ 356.674110][T19828] ? walk_component+0x171/0x6a0 [ 356.678952][T19828] tomoyo_realpath_from_path+0xc3/0x620 [ 356.684663][T19828] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 356.690998][T19828] tomoyo_check_open_permission+0x272/0x380 [ 356.696886][T19828] ? tomoyo_path_number_perm+0x590/0x590 [ 356.702517][T19828] ? map_id_range_down+0x1c4/0x340 [ 356.707625][T19828] ? path_get+0x5d/0x80 [ 356.711785][T19828] ? lock_downgrade+0x6e0/0x6e0 [ 356.716638][T19828] ? do_raw_spin_lock+0x120/0x2b0 [ 356.721652][T19828] ? rwlock_bug.part.0+0x90/0x90 [ 356.726668][T19828] tomoyo_file_open+0xa3/0xd0 [ 356.731332][T19828] security_file_open+0x45/0xb0 [ 356.736173][T19828] do_dentry_open+0x353/0x11d0 [ 356.740951][T19828] ? may_open+0x1f6/0x420 [ 356.745286][T19828] path_openat+0x1c9a/0x2740 [ 356.749872][T19828] ? __do_fast_syscall_32+0xb0/0xf0 [ 356.755082][T19828] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 356.761142][T19828] ? __filename_lookup+0x590/0x590 [ 356.766242][T19828] ? lock_acquire+0x442/0x510 [ 356.770909][T19828] ? rcu_read_lock_sched_held+0xd/0x70 [ 356.776355][T19828] ? lock_release+0x522/0x720 [ 356.781045][T19828] ? __might_fault+0xd3/0x180 [ 356.785713][T19828] do_filp_open+0x1aa/0x400 [ 356.790207][T19828] ? may_open_dev+0xf0/0xf0 [ 356.794895][T19828] ? rwlock_bug.part.0+0x90/0x90 [ 356.799838][T19828] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 356.806084][T19828] ? _find_next_bit+0x1e3/0x260 [ 356.810931][T19828] ? _raw_spin_unlock+0x24/0x40 [ 356.815769][T19828] ? alloc_fd+0x2f0/0x670 [ 356.820263][T19828] do_sys_openat2+0x16d/0x4d0 [ 356.824932][T19828] ? build_open_flags+0x6f0/0x6f0 [ 356.829943][T19828] ? lock_acquire+0x442/0x510 [ 356.834969][T19828] ? lock_release+0x522/0x720 [ 356.839649][T19828] ? __context_tracking_exit+0xb8/0xe0 [ 356.845118][T19828] ? lock_downgrade+0x6e0/0x6e0 [ 356.849976][T19828] __x64_sys_openat+0x13f/0x1f0 [ 356.854815][T19828] ? __ia32_sys_open+0x1c0/0x1c0 [ 356.859739][T19828] ? syscall_enter_from_user_mode+0x21/0x70 [ 356.865619][T19828] do_syscall_64+0x35/0xb0 [ 356.870046][T19828] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 356.876034][T19828] RIP: 0033:0x4196e4 [ 356.879930][T19828] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 356.899541][T19828] RSP: 002b:00007f15e1a3dcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 356.907961][T19828] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004196e4 [ 356.916096][T19828] RDX: 0000000000068001 RSI: 00007f15e1a3dd60 RDI: 00000000ffffff9c 12:14:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1000000000000, 0x0) [ 356.924053][T19828] RBP: 00007f15e1a3dd60 R08: 0000000000000000 R09: 0000000000000000 [ 356.932271][T19828] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000068001 [ 356.940316][T19828] R13: 00007ffd6a6feacf R14: 00007f15e1a3e300 R15: 0000000000022000 [ 356.967928][T19839] FAT-fs (loop3): Directory bread(block 6) failed [ 357.000887][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffff8000, 0x0) 12:14:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x5, 0x0, 0x0}) [ 357.043652][T19847] usb usb9: usbfs: process 19847 (syz-executor.5) did not claim interface 0 before use 12:14:40 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020010) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 357.102116][T19851] loop1: detected capacity change from 0 to 16 [ 357.109586][ T37] audit: type=1804 audit(1630757680.085:283): pid=19820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/144/bus" dev="sda1" ino=14723 res=1 errno=0 [ 357.142822][T19857] loop3: detected capacity change from 0 to 6 12:14:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x2000000000000, 0x0) [ 357.157659][T19860] usb usb9: usbfs: process 19860 (syz-executor.5) did not claim interface 0 before use [ 357.172526][T19857] FAT-fs (loop3): Directory bread(block 6) failed [ 357.192846][T19857] FAT-fs (loop3): Directory bread(block 6) failed 12:14:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffffc000, 0x0) 12:14:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x6, 0x0, 0x0}) [ 357.201353][T19865] usb usb9: usbfs: process 19865 (syz-executor.5) did not claim interface 0 before use [ 357.204186][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 357.259816][T19827] loop4: detected capacity change from 0 to 4 [ 357.270306][T19828] ERROR: Out of memory at tomoyo_realpath_from_path. 12:14:40 executing program 0 (fault-call:3 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 357.320343][T19880] loop3: detected capacity change from 0 to 6 [ 357.320521][T19879] loop1: detected capacity change from 0 to 16 [ 357.342483][T19881] usb usb9: usbfs: process 19881 (syz-executor.5) did not claim interface 0 before use 12:14:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe000000000000, 0x0) [ 357.379025][T19880] FAT-fs (loop3): Directory bread(block 6) failed [ 357.412926][T19887] usb usb9: usbfs: process 19887 (syz-executor.5) did not claim interface 0 before use [ 357.419114][T19888] FAULT_INJECTION: forcing a failure. [ 357.419114][T19888] name failslab, interval 1, probability 0, space 0, times 0 [ 357.429516][T19889] FAT-fs (loop3): Directory bread(block 6) failed [ 357.455749][T19888] CPU: 0 PID: 19888 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 357.464179][T19888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.474230][T19888] Call Trace: [ 357.477503][T19888] dump_stack_lvl+0xcd/0x134 [ 357.482100][T19888] should_fail.cold+0x5/0xa [ 357.486606][T19888] ? tomoyo_encode2.part.0+0xe9/0x3a0 [ 357.489173][T19897] loop1: detected capacity change from 0 to 16 [ 357.491980][T19888] should_failslab+0x5/0x10 [ 357.492008][T19888] __kmalloc+0x72/0x330 [ 357.506850][T19888] tomoyo_encode2.part.0+0xe9/0x3a0 [ 357.512054][T19888] tomoyo_encode+0x28/0x50 [ 357.516470][T19888] tomoyo_realpath_from_path+0x186/0x620 [ 357.522101][T19888] tomoyo_check_open_permission+0x272/0x380 [ 357.528079][T19888] ? tomoyo_path_number_perm+0x590/0x590 [ 357.533744][T19888] ? map_id_range_down+0x1c4/0x340 [ 357.539033][T19888] ? path_get+0x5d/0x80 [ 357.543189][T19888] ? lock_downgrade+0x6e0/0x6e0 [ 357.548033][T19888] ? do_raw_spin_lock+0x120/0x2b0 [ 357.553053][T19888] ? rwlock_bug.part.0+0x90/0x90 [ 357.557985][T19888] tomoyo_file_open+0xa3/0xd0 [ 357.562917][T19888] security_file_open+0x45/0xb0 [ 357.567771][T19888] do_dentry_open+0x353/0x11d0 [ 357.572533][T19888] ? may_open+0x1f6/0x420 [ 357.576858][T19888] path_openat+0x1c9a/0x2740 [ 357.581533][T19888] ? __do_fast_syscall_32+0xb0/0xf0 [ 357.586734][T19888] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 357.592798][T19888] ? __filename_lookup+0x590/0x590 [ 357.597926][T19888] ? lock_acquire+0x442/0x510 [ 357.602606][T19888] ? rcu_read_lock_sched_held+0xd/0x70 [ 357.608168][T19888] ? lock_release+0x522/0x720 [ 357.612846][T19888] do_filp_open+0x1aa/0x400 [ 357.617346][T19888] ? may_open_dev+0xf0/0xf0 [ 357.621848][T19888] ? rwlock_bug.part.0+0x90/0x90 [ 357.626869][T19888] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 357.633107][T19888] ? _find_next_bit+0x1e3/0x260 [ 357.637959][T19888] ? _raw_spin_unlock+0x24/0x40 [ 357.643072][T19888] ? alloc_fd+0x2f0/0x670 [ 357.647921][T19888] do_sys_openat2+0x16d/0x4d0 [ 357.652598][T19888] ? build_open_flags+0x6f0/0x6f0 [ 357.657615][T19888] ? lock_acquire+0x442/0x510 [ 357.662286][T19888] ? lock_release+0x522/0x720 [ 357.666958][T19888] ? __context_tracking_exit+0xb8/0xe0 [ 357.672782][T19888] ? lock_downgrade+0x6e0/0x6e0 [ 357.677722][T19888] __x64_sys_openat+0x13f/0x1f0 [ 357.682564][T19888] ? __ia32_sys_open+0x1c0/0x1c0 [ 357.687497][T19888] ? syscall_enter_from_user_mode+0x21/0x70 [ 357.693398][T19888] do_syscall_64+0x35/0xb0 [ 357.697813][T19888] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 357.703701][T19888] RIP: 0033:0x4196e4 [ 357.707585][T19888] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 12:14:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000040)) get_robust_list(0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0xc4, 0x5, 0x0, 0x0, 0x2, 0x10129, 0xf, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1a, 0x9cc, 0x1, 0x2, 0x802, 0x800, 0x1, @perf_config_ext={0x4, 0x80000000}, 0x0, 0x7fd, 0x0, 0x4}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000180)={'syztnl0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x4, 0x3f, 0x5, 0x9, 0x14, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x28}, 0x20, 0x10, 0x800, 0xfffffff9}}) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xbf9, &(0x7f000062b000)=""/4096, 0x261, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, r3}, 0x78) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000240), 0x2000, 0x0) r6 = syz_open_dev$audion(&(0x7f0000000380), 0x6, 0x40) r7 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) sendmmsg(r6, &(0x7f0000002b80)=[{{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, r7, 0x1, 0x3, 0x3, 0x4, {0xa, 0x4e22, 0xffff8000, @empty, 0x6}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000007c0)="61fa705962f8f2d33d78f8197f23a322f7cb5df9812b7d8a87ada3b56d2540336fcb2ab86831f7b926049396b32dac07b229e6abbc081cb2a5be721631946b4d7d0655699e24de48303dfc1f05e313152f74db8e0fa596e38b4b73a092f784981d23035b7ebd7bd89a7511d28511bc6bf9e5a43b03fec9ca893a2a114b98c75c87ccb364d497e2c5fe52de1f9a9985503673ed0da6350a5dbca0034947ec080ff7f650aa5eb1d5436b529dea7c546d9e9433f4a856c88d5ff8c3044d", 0xbc}, {&(0x7f0000000880)}, {&(0x7f00000008c0)="9d63e5a8d70ff30975f6de5656c0ae47b53e8cc9466c5359709f1bcc24c6d720e3f5f6fd1e21a2ca049fff1b3b02e6e1aa3f88cc73a29811ca61b33cca42ddf0034fb1d2b53610c9a2509c01169855270cbc758d91caf98e", 0x58}], 0x3, &(0x7f0000000980)=[{0xd8, 0x88, 0x6f, "80c13c2aa51eab16f680f4dadc7798d71785ad99e0931ab38cb608d5d16a969bc6d816373c773011a6f8a3d1769ce81904273d88e0c760100834c752b794c708b9ac368e5e8155f0ad0a733f263039bc67877c618a4d06d2e54fd5740758da4ce974188acfb3c7f24544e0ae0c83e18eca7509bab403b453ea7fd0ca0601da55bfaabde44398c80d7c29c54e40fece4bd114c531999fe9b302fec1ceaa290f99ecb738a98e93b0333ce2b3000679f41dffe3d6800dbf9880da0322cb28da5bdd40f094c6"}, {0x1010, 0x116, 0xd, "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"}, {0xe0, 0x10f, 0x7fffffff, "4a7ffa666ee7ed27e84c55149b5d96bae4e63732817a92453abe83922dca5efdf42fa3a48cd61ae3183fd897f81ce87d7d0c71e9f767e2e11311829306f9c548facaeec42ffa4d3cc18c9e3f688a12e160d8a0ce86b1c9a4dc9dfdc15468950eb7c7dc37faf681379e558873b3abdd570efbe3fea537a87f3202b1514bb4329e37cb3b3f499ef0fb9b4ebc8902ff7569a8d70d9c12c002d7cb4dabecf6e1ab9877d78ea43f862f0baeafbac39569b69001849aa5707a921a5c6012fb503266a3559c80c266347c6c533e96876986a3"}, {0x68, 0x115, 0x1ff, "0b7c9f02e437c992fc1af7b3cff7a63e3a0aeb2ab8ff53bede86c8f2eb0c23da2b070c42b4cb8046ad3fb2c6dde40bd177e5d564cab6da0eab5fa5946e21442d78a89a99748f219859d89e75566bc773aaaf3fdd"}, {0xd0, 0x109, 0xe80, "bcb7db6ee9ffab1b6ccda8925698cc55c1a7eed0afdacb19a59358096157c873258630d160a57edc85404628e5b4d23235e371d10c587366a0a6f399aee14cb931506d9dbee5dc65b045197157366f271146a3ca16a49919de8f26d9a54265fa6160c5af5bc631fab3508df02e634ea614a74493ba4343e0db7905bdd0e53f37d3dbf503135fd0bbc1c232a2311181c2ff3d8be2e528df73879525d3002221dd3f5673e08109ab59e3a09f4f1e0bf5539ccbf285d6aca51d743742277c8a"}], 0x1300}}, {{&(0x7f0000001c80)=@generic={0x11, "0063394b899c3c8368755e1280d391137ae0e4daca3a4a47ec1e8bf1b809cd4c9640620625d116f5b2ea0142cc253547bebedc7ee1afc580c38a083bbc3e1ec956b602922a63831edf8062986fd62dfdfdb894efcd65198cb75c773850a9413a0192ba4056b66b64d0bb4015b798d70056178680e7694600fc93e06601b0"}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001d00)="0cd8867845d51acdeaa930ced4cd93262c82d9c97520d68e9e940469c8132ccbe7654481ce8473422688fc95b7ac7cf5698d2b24a20faab5fc5b977a3ed75db0a3135958f3e3b03304fff65d76f36a4164a4e362cc7632dcc2ae216829127790c121bdab24dcb5bf1bb88fa6bd19e6776b9dc9f8eb344763695c6450e4a3a443f1d6374e800059e61d", 0x89}, {&(0x7f0000001dc0)="885f927d96ac9b978db6cf19b4ae0096f747f64d371961c2b3cd8fd95e", 0x1d}], 0x2, &(0x7f0000001e40)=[{0xe0, 0x6, 0x101, "390c5f224f3f728ed32520eacf6bed42078e7b1da59249a10eb5058e8a2a22342d18b5836cafc49578fa9edcfe611b262d135f54a1e09601dc84832f14fe6930cf3750f1b09ecb6ef1475b13f63fd916b05991a68da99fd2e94e5e4535fdb188b7e9544b3ba175267dc44f2f8b1d0ea73d795f1e0e5b6b362d3f2eb7a654b545a3cb06d81af8f2a5db1d605d5986807bc255cefe1be4cbf65f845f128a44504ef1e9db5b0ebc0cdc989b140a73121afcf267473a46b83851360386b70d84a2651be2e98a5a0ea6d6a5ceeb700c93"}, {0xe8, 0x0, 0x1f, "166e215cf65df97c6fdadf4a9135afa82d5e97cb41b1ffdc8e741d8d6dc94d5a3a3e010a41705b68dd7a40055dacd568e9cd785e873aa4e5b27c978781990b5d10b78d258708c680a6601d08cb942aaaf189f7008834b401a9c9fd4d949e60b344e6c81ded0cdf37e0aceae2429d26ad9b79e2ff00acfcf56c97b06f7a4a4fa10ddbd6804815d2ef785afc43ab31fd4dd17d25b55f49f88d175249f33664f3e2dedce6e79447f7e7bb9920a016ac8ce4ab92886294cbfd3ba3072e327e728d44636159ed67e67d7352ce3cd56ed7cfe6fda4e8a5113a"}, {0x40, 0x114, 0xf64, "49a1b890f7d0104e738320b67a85543c80c7c8ed1777a036d7040f63d1f38d7fb6497535b628de1c880f4c"}, {0xf8, 0x119, 0x3f, "cd498cf6da920afad5c9a704602044b786951e2feb0b055f1bb7ca5d28ea0f9a94267dc8499f60d501c0c2f1970835961f3bcb727042ac90b8e70ca4a8e59d2ebfb0866240c6427f3fc6193ce3b597a110f49accb8c275f8b358f74c3e0094456948989e91a1892f0d97cd39b95b18bcd622fd4d6f6f8bdd47c4c24fa44d0c1dec45e5bae702dc5ca747e98d62ae1184020d89ae5e92bfdd3d020dc25b573c5c79b6a2f2311013bf91f19263024e2c54a5faa16fbae8585aa0330317400f19e077dba758262e2b32a1992ec9244c6cf4529ec760fdaea2f0a73af1df32ef15de6bbaa9b05fe4"}, {0xa8, 0x115, 0x1, "98287cdf2dc42e4d1400320cca04b443c3e77f6ed0d480b94ea22080e5384ce8a2d9262491ee9d7e0defc5996ba75b8b70bee6543272c212e4be1ce53f127469a93afd2397350f6c697a9be19e374d61f5c89ddf4987b1cdedaf44062117bf7d7950e6360a6d24d94a817819197129b42e7ebee826f3007702f5c852b41b7ad54bc6f56e077b6f028e95d2721e6bd8af4358"}, {0xc0, 0x105, 0xc72, "2926b8da1065d98bd35c307b9e8e0b770ed196acea62a37888fb2b0eedfa3b03263ebc53c89fcc89f6be919e8e596fe6ddc32045f010c7c42fdae948d606b96a1623230da4a6f8ab50e701e326573c9eb6e78803ba42dc8a89d73c82e9c7ed89357f826635940b77ba8d3dbdc4a638fb1ec5169b0a249025883a7be7b07f1dd3f01831be4e54cd79695e60dd18a29ee9758a85128597f678c8c8aea856903cb7a9fff4df9dcfb7c7ff93ab860a"}], 0x468}}, {{&(0x7f00000022c0)=@ieee802154={0x24, @none={0x0, 0x1}}, 0x80, &(0x7f0000002980)=[{&(0x7f0000002340)="97c61569ea0414114d789103a07caba1f6fbfe8cc70546c0c81568faa2f286d8395e29af4a4cada9f32b521c2ecc52f03cc3b60efcc88f3f0d675071c35086697b5402f7eb0ecb2d4c5711e0010f72756e6d786cdaad1b1ad6a858cb9a756d5f5326ac88036c6264acd79b2be0f2774ded8e816d6ed75be46a29fc978d8cca57ea712bbdffc16eb5609ca50bf49d39ec2312d7575b09def4a782545397d18f45d468c0a0c47036614c02b9c88be5fedd40034903ec21749746a8cb08ac1fa1c012d38ca118668655f27cebc6bc3e9228c0", 0xd1}, {&(0x7f0000002440)="ccc08ae57c7f001b028c2901640f923b1351e5103439e71f03b98eda45a61a2363a9a53f8201e370f15a161affec4a4bd2bd8d772522d7d78f56bebbd54b09d8516972e5e6ce32dfa5c1", 0x4a}, {&(0x7f00000024c0)="42e4a066ed2ad8ae669475e9688bf28094ea996e30a0e01bb63e36da4bb29202b02d5f49f9eb26741cd4b9ec5e3124a0c8b5f7c088ee15b4fd25fe904615938d2eebf2bdc0e32688fb81a34c128e87d17cdbda06c1548857ad4f9d21a8442c686864cc3363456260d92c8a2c5ffee9c2c2216f15bcca1a3588b6a8d9c1270937d13cfe0f351943ce3255b083136f1e504b769237705b9905c58ab4f49ad2f818432988bf3fea1464cf9e89994aaefa30f8b04fc15e57961db6abc5af051599e12aaf216eda6530dd28d0e81de6b3803e02c579c3170c28ecbfc2", 0xda}, {&(0x7f00000025c0)="a355c7cfdc9aa5cadf3a4af9bc71adaf1ebc53fb0b0f626dc7b1084aaa125276063ed8a83b220a10b8c6b25f37913f82d9a02fc3b76e257972c1ce262e5d2492be1c2e383ee98e4ece7097e3b6d2e16156af4ab55b6d0d945bdfb137acf76cdc2fc9eab632a0fbd49a3c8d4600c67b3be80b8f8bbbb2f70480ac3bf0f52495d3eac8e5fa2c", 0x85}, {&(0x7f0000002680)="6b48b4a9c97e6a739980f01f776094c3a253c9b04aefdab3c97a3dc5ba0c7ee0e917714669b7b74c379577b03e17ab2b50efeb26fdf026f073c344fdd37afe9ad50771a0f16aa66be7c08799b0985f1a24543e60672c1664a2986c5bb5b0103013b832c2c19f63e8f239acb8810b2a4ccf0cb3327b67baac2b87e8fea389eaf978592aa6884da45a62e35811d2c8bb1a6225e2150169914f703090df9c2476e8c3ba2df4116751e59ec7d7d6f308e395f53446b3", 0xb4}, {&(0x7f0000002740)="69843dafc1fecbbf0b89a6fbb6463217b26c04c3495ba193338d50727b53", 0x1e}, {&(0x7f0000002780)="7b559c95012e2b9a0c8002890f3b4e2b970514f48f83096eb9800ac025a58779ccc24e742c219f21dc2f12d066de8d21c56b5dd0949b56c79487fff3e0a4c91c069c311d7fc05a7fe917709e6a364d0cd76943f2bd7a956df59e149744fafdccdfc5c462a2fcd88e51d9eb6dc94a02b577444020d8da3b53232db4c03e1212eb985028eb65e4fca57d852e6aea938c154d655b8dcbca6ddb4a4841e86b9b618af2290ae8b6914143909d3e09e2fe7b29ca7cd35f90dbfa45937e1eb45b7ce877527b2782999208a62ec6f5819f9bb44049a028402e5e82cd7ee070d9b9c06c667e80f187f761e248c6d35c169b9820d1e9c240743bc1e2cc", 0xf8}, {&(0x7f0000002880)="bd75a2b7ba0734d39fe3016c726dd8492eed01574ab5cf50a7a5639bf34b15cbad9b61b2556a70ae50179993c1356ce0425265286019fb8606e2519b11e3ab56412d8a714b3ef3a39bba23e925382c6ab5c6c10520cc50528d8b8c55b55f9a4e1c96d7137dd5", 0x66}, {&(0x7f0000002900)="93b84f2fa983e4155dbf36e5d86f507f149a00593a8dcae0925f1ded7e5d3f6c46ff8ea69cd8d77e3ea885ac6c886fa04cfaa79ff84735785ac546558f8a2a159949ab56f2bc8eaaa022e7992069d9490062bc91337cc33cf909efeeed0f79a6d98f75cf4d041e0f1e02e7cf38d914d71af9ad2dfb", 0x75}], 0x9, &(0x7f0000002a40)=[{0x50, 0x113, 0x2, "8e9586b1a332791da95e9f2a38729222aeb1547905d87e55444c59d2c0e4fe26bb5b255d1cee0b19fc199d6045a6689f1bce9750ed4b987e50c87b45aeedcb"}, {0x30, 0x1, 0x0, "4246a158fa2f89f67b205b7d70ceac9ec8bd84d2a25d24b8de619d73"}, {0xb8, 0x88, 0x5efbf748, "bd5df2ba817568e653bbb627613661245d58e402ab83eab7aff99c2709b0b4440abae43902a827e37da1b3bbdd884d5d30bf1f81e358db2dd4089cc7232d9bcbb72208c58c489da5ee61a67a91b668e5a0afa7d21ebfd27de7902eb7a1f50753d3a49eefc75ee4cb7c45d8f10d6b1ee98d87fbbf67332d2f528115e298fc01c45c2131ed7f1f61c57abc169f2ab229d711f03acb4dbc3443c8a85e1bd8dec79a0ecddba79b87aa13"}], 0x138}}], 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', r1, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x10, 0x4, 0x8}, 0x10, r4, r5}, 0x78) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000040)=0xe) ioctl$TIOCVHANGUP(r8, 0x5437, 0x0) 12:14:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x7, 0x0, 0x0}) 12:14:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffffe000, 0x0) [ 357.727447][T19888] RSP: 002b:00007f15e1a3dcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 357.736118][T19888] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004196e4 [ 357.744104][T19888] RDX: 0000000000068001 RSI: 00007f15e1a3dd60 RDI: 00000000ffffff9c [ 357.752085][T19888] RBP: 00007f15e1a3dd60 R08: 0000000000000000 R09: 0000000000000000 [ 357.760047][T19888] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000068001 [ 357.768031][T19888] R13: 00007ffd6a6feacf R14: 00007f15e1a3e300 R15: 0000000000022000 12:14:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x10000000000000, 0x0) [ 357.852570][T19904] usb usb9: usbfs: process 19904 (syz-executor.5) did not claim interface 0 before use [ 357.880124][T19908] usb usb9: usbfs: process 19908 (syz-executor.5) did not claim interface 0 before use [ 357.895197][T19888] ERROR: Out of memory at tomoyo_realpath_from_path. 12:14:41 executing program 0 (fault-call:3 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0xa, 0x0, 0x0}) [ 357.920087][T19909] loop3: detected capacity change from 0 to 6 [ 357.943414][T19909] FAT-fs (loop3): Directory bread(block 6) failed [ 357.975674][T19917] loop1: detected capacity change from 0 to 16 [ 358.007180][T19921] usb usb9: usbfs: process 19921 (syz-executor.5) did not claim interface 0 before use [ 358.018641][T19922] FAULT_INJECTION: forcing a failure. [ 358.018641][T19922] name failslab, interval 1, probability 0, space 0, times 0 [ 358.037152][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 358.039431][T19922] CPU: 1 PID: 19922 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 358.062442][T19922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:14:41 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020011) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 358.062696][T19926] usb usb9: usbfs: process 19926 (syz-executor.5) did not claim interface 0 before use [ 358.072512][T19922] Call Trace: [ 358.072522][T19922] dump_stack_lvl+0xcd/0x134 [ 358.072550][T19922] should_fail.cold+0x5/0xa [ 358.072578][T19922] ? usbdev_open+0x93/0x930 [ 358.100024][T19922] should_failslab+0x5/0x10 [ 358.104634][T19922] kmem_cache_alloc_trace+0x55/0x3c0 [ 358.109925][T19922] ? async_completed+0xad0/0xad0 [ 358.114864][T19922] usbdev_open+0x93/0x930 [ 358.119219][T19922] ? lock_downgrade+0x6e0/0x6e0 12:14:41 executing program 4: sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2800}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x1a4, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8445}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfa5}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x88, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x282, 0x11580}], 0x0, &(0x7f00000000c0)) creat(&(0x7f0000000080)='./file0\x00', 0x125) r1 = socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000001b00)=[{&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="961f7e2391fa83704a7e2cd43794d872de945f4806e4355ac61653b578a13190be6748e1cd3d835cc841de3d72f79a9079337eff884577ca6c33850526a02385aa78b12bd1a23f8a6a35bdb4ca0411e2d78ac6405516e07437369b778bc41d7bd95b6c2e58cfd83360a2b47810cb20fe28d4e4fbc82de06711627278483be51be58707132438d23e84f115846a26b3ff815b0846005a43036e79ca572df6c4a78e5b61deaf004d5d52a341147cf66ae07b967336241e64f3bcbda69dc052bb1c3e28160f7ade464f0f2124e9725e345770513ab9", 0xd4}, {&(0x7f0000001700)="9f1625bc04e37b15c7350ca297fb47ad88fab5a5ed30b82f6e232379e5df587e8ff0a0310db53447f12d002f27fac06a42adf250bf4f19ffe07fb464872b60d85df4eb8ee1f48384adbde870e7643fe5c05893c99eb39f7cd7c44607c137f96e3187c60e91981955e6342dc588fec81d608cb277e415f1ad3110f2ad925a00b6651359ff9aa24dd38343afebd8adca264e53", 0x92}, {&(0x7f0000000380)="ae5eed608b2dbb686789988859bab4835c7ec57ce07812", 0x17}, {&(0x7f00000017c0)="2ac757b8af4176e485c170b0b54fe4840fd756b36294ffacceca667502c973a6c098ca9f681cd49a660bda78bd393a3c064817ed7f4619092cb07408b6160b06dcd99988c5d220933cad6b2537b03d79555eb8b15874ffb360607b79de228068cea35e0f1e22a5601b771af9", 0x6c}, {&(0x7f0000001840)="b751fd9e37a756db800d66770c0415ccb1b1d025163805044d6f43f1721c0f5b2ff229a634a47895674b7f888c765306c44f73470f52db4c55ddb4201f1d6c60503e314fadd8ab86bffc92ced92a6ebede6f7a66950ff0fa5521a32af878b9b1ab113619c7aac22774", 0x69}, {&(0x7f00000018c0)="8f163e8ddd7000e43f2e362e7bbfb117a2f7f2bce325ec65a687bbb9e0efacc8d40f88a6eae661ca38f8267af70f3eb05e779aa7283797fbddbdd6e199692f3a22dc86f2230f790d13682c98118ea5552c", 0x51}, {&(0x7f0000001940)="531bf8ce6517f3e0f1163f6647a61508137066eacc6690113a07548459047f44ec6ded3c0c010e0d05af223572395be810b8d94fce35c39ab3b2e1bb83bfde7dc36c3c1d29664c186a08a9d37bd785fbb615a3a0df4b234d456188fcea43293331a46e8dccb4f958c069ae6b078296eea17f024acb1e16d6c9bfbcd1c245308d9964669804143556621c13c1c3b619b40dd838e6f49a0963b62d20b647bf0ac73d6d5f1b98a3c52442464fa35a2072791cedbf296986fadc275444f8b516419f653a64ec722122bab3287d9987895c31a2a37e802e443a5a36b8b3f2cf9646", 0xdf}, {&(0x7f0000000400)="6e27d9c9903fd0de436b76e77563c488c34a72c2d3c78ecb7a21e7b4", 0x1c}, {&(0x7f0000001a40)="8922d30cad0b796b94d1544105632305a16fca117dc652ce51a16c22b00d9fa19bc9219e4fc30ed7b6e8cd96bab4ec6fb3c5a6ec4d77f292c71fd2eac21de0f7e80e8db162356f697e1857be4c33853e5b36db85453be77f76e22290b411c102fe2d912026642d79f6d591b3014f2f100b3ef6529fd48c956dd4d4a3b7c01043ff37b4a3401eca36293a36afe5c6985b3dc376b726ba9671da370c97be20d1060a776f8e4a768971", 0xa8}], 0xa) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000001e00)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001dc0)={&(0x7f0000001c00)={0x190, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0x5c, 0xc, 0x0, 0x1, [{0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb475}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa088}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x27181c4e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x74d9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf33e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xce8516a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76805401}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcd7f}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7435cff2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2737865}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0x108, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30ee4495}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e17b71f}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x92a7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3e862527}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd527}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe9de}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3878}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8c5e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x689b27ff}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1f9e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa5ae}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x66c96bea}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24a7beba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb58b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x84de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x60253fc7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5fab}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x84adc99}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x55ce}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe02a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9a3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2ea14af5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd82}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5d7026d2}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb8f3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x162a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5ddbfab3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc98c635}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1534}]}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x8000}, 0x4010) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) 12:14:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfffff000, 0x0) 12:14:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x48, 0x0, 0x0}) [ 358.124071][T19922] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 358.130331][T19922] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 358.136687][T19922] ? kobject_get_unless_zero+0x15a/0x1e0 [ 358.144345][T19922] ? async_completed+0xad0/0xad0 [ 358.149286][T19922] ? rwlock_bug.part.0+0x90/0x90 [ 358.154426][T19922] ? async_completed+0xad0/0xad0 [ 358.159367][T19922] chrdev_open+0x266/0x770 [ 358.164950][T19922] ? cdev_device_add+0x210/0x210 [ 358.169918][T19922] ? fsnotify_perm.part.0+0x22d/0x620 [ 358.175296][T19922] do_dentry_open+0x4c8/0x11d0 [ 358.180148][T19922] ? cdev_device_add+0x210/0x210 [ 358.185087][T19922] ? may_open+0x1f6/0x420 [ 358.186384][T19929] usb usb9: usbfs: process 19929 (syz-executor.5) did not claim interface 0 before use [ 358.189417][T19922] path_openat+0x1c9a/0x2740 [ 358.189444][T19922] ? __do_fast_syscall_32+0xb0/0xf0 [ 358.209304][T19922] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 358.215464][T19922] ? __filename_lookup+0x590/0x590 [ 358.220658][T19922] ? lock_acquire+0x442/0x510 [ 358.225328][T19922] ? rcu_read_lock_sched_held+0xd/0x70 [ 358.230786][T19922] ? lock_release+0x522/0x720 [ 358.235461][T19922] ? __might_fault+0xd3/0x180 [ 358.240141][T19922] do_filp_open+0x1aa/0x400 [ 358.244642][T19922] ? may_open_dev+0xf0/0xf0 [ 358.249139][T19922] ? rwlock_bug.part.0+0x90/0x90 [ 358.254065][T19922] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 358.260314][T19922] ? _find_next_bit+0x1e3/0x260 [ 358.265175][T19922] ? _raw_spin_unlock+0x24/0x40 [ 358.270032][T19922] ? alloc_fd+0x2f0/0x670 [ 358.274348][T19922] do_sys_openat2+0x16d/0x4d0 [ 358.279013][T19922] ? build_open_flags+0x6f0/0x6f0 [ 358.284024][T19922] ? lock_acquire+0x442/0x510 [ 358.288686][T19922] ? lock_release+0x522/0x720 [ 358.293354][T19922] ? __context_tracking_exit+0xb8/0xe0 [ 358.298799][T19922] ? lock_downgrade+0x6e0/0x6e0 [ 358.303656][T19922] __x64_sys_openat+0x13f/0x1f0 [ 358.308598][T19922] ? __ia32_sys_open+0x1c0/0x1c0 [ 358.313523][T19922] ? syscall_enter_from_user_mode+0x21/0x70 [ 358.319497][T19922] do_syscall_64+0x35/0xb0 [ 358.323903][T19922] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 358.329785][T19922] RIP: 0033:0x4196e4 [ 358.333664][T19922] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 358.353606][T19922] RSP: 002b:00007f15e1a3dcc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 358.362092][T19922] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004196e4 [ 358.370238][T19922] RDX: 0000000000068001 RSI: 00007f15e1a3dd60 RDI: 00000000ffffff9c 12:14:41 executing program 0 (fault-call:3 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 358.378192][T19922] RBP: 00007f15e1a3dd60 R08: 0000000000000000 R09: 0000000000000000 [ 358.386234][T19922] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000068001 [ 358.394209][T19922] R13: 00007ffd6a6feacf R14: 00007f15e1a3e300 R15: 0000000000022000 12:14:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x20000000000000, 0x0) [ 358.445964][T19931] loop4: detected capacity change from 0 to 264192 [ 358.486727][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 358.503025][T19939] loop3: detected capacity change from 0 to 6 [ 358.517850][T19945] usb usb9: usbfs: process 19945 (syz-executor.5) did not claim interface 0 before use [ 358.529864][T19939] FAT-fs (loop3): Directory bread(block 6) failed [ 358.531248][T19931] EXT4-fs (loop4): 1 orphan inode deleted [ 358.550089][T19931] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 358.552944][T19950] loop1: detected capacity change from 0 to 16 [ 358.571850][T19949] FAULT_INJECTION: forcing a failure. [ 358.571850][T19949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 358.576751][T19931] ext4 filesystem being mounted at /root/syzkaller-testdir048115300/syzkaller.v464Vw/18/file0 supports timestamps until 2038 (0x7fffffff) [ 358.612621][T19949] CPU: 0 PID: 19949 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 358.621065][T19949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.631441][T19949] Call Trace: [ 358.634730][T19949] dump_stack_lvl+0xcd/0x134 [ 358.639336][T19949] should_fail.cold+0x5/0xa [ 358.643939][T19949] _copy_to_user+0x2c/0x150 [ 358.648451][T19949] simple_read_from_buffer+0xcc/0x160 [ 358.653823][T19949] proc_fail_nth_read+0x187/0x220 [ 358.656657][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 358.658852][T19949] ? proc_fault_inject_read+0x220/0x220 [ 358.658878][T19949] ? security_file_permission+0xab/0xd0 [ 358.681027][T19949] ? proc_fault_inject_read+0x220/0x220 [ 358.686616][T19949] vfs_read+0x1b5/0x600 [ 358.690775][T19949] ksys_read+0x12d/0x250 [ 358.695016][T19949] ? vfs_write+0xae0/0xae0 [ 358.699459][T19949] ? syscall_enter_from_user_mode+0x21/0x70 [ 358.705471][T19949] do_syscall_64+0x35/0xb0 [ 358.709979][T19949] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 358.715966][T19949] RIP: 0033:0x41937c [ 358.719854][T19949] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 358.740679][T19949] RSP: 002b:00007f15e1a3e170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 358.749177][T19949] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000041937c [ 358.757175][T19949] RDX: 000000000000000f RSI: 00007f15e1a3e1e0 RDI: 0000000000000004 [ 358.765142][T19949] RBP: 00007f15e1a3e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 358.773105][T19949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 12:14:41 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) accept4(r0, &(0x7f0000000080)=@isdn, &(0x7f0000000140)=0x80, 0x180000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x4c, 0x0, 0x0}) 12:14:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffffff7f, 0x0) 12:14:41 executing program 4: sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2800}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x101000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x1a4, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1ff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8445}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfa5}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x88, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4000}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x282, 0x11580}], 0x0, &(0x7f00000000c0)) creat(&(0x7f0000000080)='./file0\x00', 0x125) r1 = socket(0x11, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000001b00)=[{&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="961f7e2391fa83704a7e2cd43794d872de945f4806e4355ac61653b578a13190be6748e1cd3d835cc841de3d72f79a9079337eff884577ca6c33850526a02385aa78b12bd1a23f8a6a35bdb4ca0411e2d78ac6405516e07437369b778bc41d7bd95b6c2e58cfd83360a2b47810cb20fe28d4e4fbc82de06711627278483be51be58707132438d23e84f115846a26b3ff815b0846005a43036e79ca572df6c4a78e5b61deaf004d5d52a341147cf66ae07b967336241e64f3bcbda69dc052bb1c3e28160f7ade464f0f2124e9725e345770513ab9", 0xd4}, {&(0x7f0000001700)="9f1625bc04e37b15c7350ca297fb47ad88fab5a5ed30b82f6e232379e5df587e8ff0a0310db53447f12d002f27fac06a42adf250bf4f19ffe07fb464872b60d85df4eb8ee1f48384adbde870e7643fe5c05893c99eb39f7cd7c44607c137f96e3187c60e91981955e6342dc588fec81d608cb277e415f1ad3110f2ad925a00b6651359ff9aa24dd38343afebd8adca264e53", 0x92}, {&(0x7f0000000380)="ae5eed608b2dbb686789988859bab4835c7ec57ce07812", 0x17}, {&(0x7f00000017c0)="2ac757b8af4176e485c170b0b54fe4840fd756b36294ffacceca667502c973a6c098ca9f681cd49a660bda78bd393a3c064817ed7f4619092cb07408b6160b06dcd99988c5d220933cad6b2537b03d79555eb8b15874ffb360607b79de228068cea35e0f1e22a5601b771af9", 0x6c}, {&(0x7f0000001840)="b751fd9e37a756db800d66770c0415ccb1b1d025163805044d6f43f1721c0f5b2ff229a634a47895674b7f888c765306c44f73470f52db4c55ddb4201f1d6c60503e314fadd8ab86bffc92ced92a6ebede6f7a66950ff0fa5521a32af878b9b1ab113619c7aac22774", 0x69}, {&(0x7f00000018c0)="8f163e8ddd7000e43f2e362e7bbfb117a2f7f2bce325ec65a687bbb9e0efacc8d40f88a6eae661ca38f8267af70f3eb05e779aa7283797fbddbdd6e199692f3a22dc86f2230f790d13682c98118ea5552c", 0x51}, {&(0x7f0000001940)="531bf8ce6517f3e0f1163f6647a61508137066eacc6690113a07548459047f44ec6ded3c0c010e0d05af223572395be810b8d94fce35c39ab3b2e1bb83bfde7dc36c3c1d29664c186a08a9d37bd785fbb615a3a0df4b234d456188fcea43293331a46e8dccb4f958c069ae6b078296eea17f024acb1e16d6c9bfbcd1c245308d9964669804143556621c13c1c3b619b40dd838e6f49a0963b62d20b647bf0ac73d6d5f1b98a3c52442464fa35a2072791cedbf296986fadc275444f8b516419f653a64ec722122bab3287d9987895c31a2a37e802e443a5a36b8b3f2cf9646", 0xdf}, {&(0x7f0000000400)="6e27d9c9903fd0de436b76e77563c488c34a72c2d3c78ecb7a21e7b4", 0x1c}, {&(0x7f0000001a40)="8922d30cad0b796b94d1544105632305a16fca117dc652ce51a16c22b00d9fa19bc9219e4fc30ed7b6e8cd96bab4ec6fb3c5a6ec4d77f292c71fd2eac21de0f7e80e8db162356f697e1857be4c33853e5b36db85453be77f76e22290b411c102fe2d912026642d79f6d591b3014f2f100b3ef6529fd48c956dd4d4a3b7c01043ff37b4a3401eca36293a36afe5c6985b3dc376b726ba9671da370c97be20d1060a776f8e4a768971", 0xa8}], 0xa) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000001e00)={&(0x7f0000001bc0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001dc0)={&(0x7f0000001c00)={0x190, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0x5c, 0xc, 0x0, 0x1, [{0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb475}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa088}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x27181c4e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x74d9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf33e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xce8516a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x76805401}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcd7f}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7435cff2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2737865}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0x108, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30ee4495}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2e17b71f}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x92a7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3e862527}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd527}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe9de}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3878}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8c5e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x689b27ff}]}, {0x44, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1f9e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa5ae}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x66c96bea}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x24a7beba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb58b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x84de}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x60253fc7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5fab}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x84adc99}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x55ce}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe02a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9a3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2ea14af5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdd82}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5d7026d2}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb8f3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x162a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5ddbfab3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc98c635}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1534}]}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x8000}, 0x4010) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) [ 358.781070][T19949] R13: 00007ffd6a6feacf R14: 00007f15e1a3e300 R15: 0000000000022000 12:14:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x40000000000000, 0x0) [ 358.833400][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 358.833852][T19963] usb usb9: usbfs: process 19963 (syz-executor.5) did not claim interface 0 before use [ 358.900446][T19975] loop4: detected capacity change from 0 to 264192 [ 358.900492][T19976] usb usb9: usbfs: process 19976 (syz-executor.5) did not claim interface 0 before use [ 358.907906][T19974] loop1: detected capacity change from 0 to 16 [ 358.921675][T19978] loop3: detected capacity change from 0 to 6 12:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x60, 0x0, 0x0}) [ 358.954861][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 358.984699][T19975] EXT4-fs (loop4): 1 orphan inode deleted 12:14:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x60000000000000, 0x0) [ 359.002317][T19978] FAT-fs (loop3): Directory bread(block 6) failed [ 359.018975][T19975] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 12:14:42 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004ab000/0x1000)=nil, 0x1000, 0x2000000, 0x2010, r3, 0x5a080000) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 359.088798][T19975] ext4 filesystem being mounted at /root/syzkaller-testdir048115300/syzkaller.v464Vw/19/file0 supports timestamps until 2038 (0x7fffffff) 12:14:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xffffffe5, 0x0) 12:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000023, 0x68001) [ 359.131999][T19998] usb usb9: usbfs: process 19998 (syz-executor.5) did not claim interface 0 before use [ 359.153883][T20000] loop1: detected capacity change from 0 to 16 12:14:42 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000040)={0x114, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0xc, 0x2, 0x0, 0x0, @u64}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb47d96219c08c029d1608a487f26fbe816b89f7cb81bff81a8b7a82565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875cf0d972df9e99f07976773f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fdc2f4393c05a007d12b505a84dfdb98d568175b62421d726d1e5331e1ddfd4d770b57e091511131"]}]}, 0x114}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg$unix(r2, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/147, 0x93}, {&(0x7f0000000240)=""/143, 0x8f}, {&(0x7f0000000300)=""/86, 0x56}, {&(0x7f0000000380)=""/43, 0x2b}], 0x4, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}}], 0x1, 0x0, &(0x7f0000000440)={0x77359400}) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000600)={'filter\x00', 0x2a, "b4b9b6a53bb394519f827e2bc8f75044bd9c7b3cd730b0f542666066d8c676d8238a878986cf0c7439ea"}, &(0x7f0000000680)=0x4e) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r5, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) mmap(&(0x7f00004cc000/0x4000)=nil, 0x4000, 0x1800002, 0x13, r5, 0x7efb0000) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a8, 0x2c0, 0x9403, 0x0, 0x2c0, 0x2c0, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0xd5030000, 0x4, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x508) 12:14:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x68, 0x0, 0x0}) [ 359.211452][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 359.224009][T20013] loop3: detected capacity change from 0 to 6 12:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000025, 0x68001) 12:14:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x80ffff00000000, 0x0) [ 359.270176][T20013] FAT-fs (loop3): Directory bread(block 6) failed 12:14:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfffffff6, 0x0) 12:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000002a, 0x68001) [ 359.319701][T20019] usb usb9: usbfs: process 20019 (syz-executor.5) did not claim interface 0 before use 12:14:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x6c, 0x0, 0x0}) 12:14:42 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000080)=0x7) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 359.391378][T20035] loop3: detected capacity change from 0 to 6 [ 359.401128][T20036] loop1: detected capacity change from 0 to 16 [ 359.413089][T20038] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.4'. [ 359.420835][T20035] FAT-fs (loop3): Directory bread(block 6) failed 12:14:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x88000000000000, 0x0) 12:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000002b, 0x68001) 12:14:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xfffffffe, 0x0) [ 359.462732][T20046] usb usb9: usbfs: process 20046 (syz-executor.5) did not claim interface 0 before use [ 359.476768][T20047] xt_recent: hitcount (3573743616) is larger than allowed maximum (255) 12:14:42 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000040)={0x114, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0xc, 0x2, 0x0, 0x0, @u64}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb47d96219c08c029d1608a487f26fbe816b89f7cb81bff81a8b7a82565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875cf0d972df9e99f07976773f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fdc2f4393c05a007d12b505a84dfdb98d568175b62421d726d1e5331e1ddfd4d770b57e091511131"]}]}, 0x114}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg$unix(r2, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/147, 0x93}, {&(0x7f0000000240)=""/143, 0x8f}, {&(0x7f0000000300)=""/86, 0x56}, {&(0x7f0000000380)=""/43, 0x2b}], 0x4, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}}], 0x1, 0x0, &(0x7f0000000440)={0x77359400}) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000600)={'filter\x00', 0x2a, "b4b9b6a53bb394519f827e2bc8f75044bd9c7b3cd730b0f542666066d8c676d8238a878986cf0c7439ea"}, &(0x7f0000000680)=0x4e) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r5, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) mmap(&(0x7f00004cc000/0x4000)=nil, 0x4000, 0x1800002, 0x13, r5, 0x7efb0000) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a8, 0x2c0, 0x9403, 0x0, 0x2c0, 0x2c0, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0xd5030000, 0x4, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x508) 12:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000002d, 0x68001) [ 359.512673][T20038] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.4'. [ 359.513316][T20051] usb usb9: usbfs: process 20051 (syz-executor.5) did not claim interface 0 before use 12:14:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x74, 0x0, 0x0}) [ 359.593727][T20061] loop1: detected capacity change from 0 to 16 [ 359.623266][T20067] loop3: detected capacity change from 0 to 6 12:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000002e, 0x68001) [ 359.637931][T20071] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.4'. [ 359.657084][T20067] FAT-fs (loop3): Directory bread(block 6) failed 12:14:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xc0ffff00000000, 0x0) 12:14:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe000000000000, 0x0) 12:14:42 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000040)={0x114, 0x13, 0x1, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0xc, 0x2, 0x0, 0x0, @u64}, @typed={0x8, 0x0, 0x0, 0x0, @fd}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb47d96219c08c029d1608a487f26fbe816b89f7cb81bff81a8b7a82565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875cf0d972df9e99f07976773f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fdc2f4393c05a007d12b505a84dfdb98d568175b62421d726d1e5331e1ddfd4d770b57e091511131"]}]}, 0x114}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg$unix(r2, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/147, 0x93}, {&(0x7f0000000240)=""/143, 0x8f}, {&(0x7f0000000300)=""/86, 0x56}, {&(0x7f0000000380)=""/43, 0x2b}], 0x4, &(0x7f00000004c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}}], 0x1, 0x0, &(0x7f0000000440)={0x77359400}) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000600)={'filter\x00', 0x2a, "b4b9b6a53bb394519f827e2bc8f75044bd9c7b3cd730b0f542666066d8c676d8238a878986cf0c7439ea"}, &(0x7f0000000680)=0x4e) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r5, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) mmap(&(0x7f00004cc000/0x4000)=nil, 0x4000, 0x1800002, 0x13, r5, 0x7efb0000) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000a80)=@raw={'raw\x00', 0x3c1, 0x3, 0x4a8, 0x2c0, 0x9403, 0x0, 0x2c0, 0x2c0, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2c0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0xd5030000, 0x4, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x508) [ 359.690158][T20071] usb usb9: usbfs: process 20071 (syz-executor.4) did not claim interface 0 before use [ 359.714834][T20076] xt_recent: hitcount (3573743616) is larger than allowed maximum (255) [ 359.769428][T20079] usb usb9: usbfs: process 20079 (syz-executor.5) did not claim interface 0 before use 12:14:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000030, 0x68001) [ 359.827341][T20089] netlink: 236 bytes leftover after parsing attributes in process `syz-executor.4'. [ 359.840329][T20090] loop1: detected capacity change from 0 to 16 [ 359.862332][T20096] loop3: detected capacity change from 0 to 6 [ 359.871152][T20089] usb usb9: usbfs: process 20089 (syz-executor.4) did not claim interface 0 before use [ 359.889254][T20089] xt_recent: hitcount (3573743616) is larger than allowed maximum (255) [ 359.903963][T20096] FAT-fs (loop3): Directory bread(block 6) failed [ 359.912811][T20096] FAT-fs (loop3): Directory bread(block 6) failed [ 360.308903][ T37] kauditd_printk_skb: 17 callbacks suppressed [ 360.308918][ T37] audit: type=1804 audit(1630757683.405:301): pid=20066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/149/bus" dev="sda1" ino=14744 res=1 errno=0 [ 360.347480][ C0] net_ratelimit: 2 callbacks suppressed 12:14:43 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r5, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) preadv(r5, &(0x7f00000000c0), 0x0, 0x6, 0x7fff) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r6, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000080)) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000058, 0x68001) 12:14:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x7a, 0x0, 0x0}) 12:14:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf0ffffffffffff, 0x0) 12:14:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x10000000000000, 0x0) 12:14:43 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x5, 0xff, 0x5, 0x8, 0x0, 0x6, 0x3040e, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x5, @perf_bp={&(0x7f0000000100), 0x4}, 0x5000, 0x7, 0x1, 0x4, 0x1f, 0x4592, 0x4, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x10004, r0, 0x8) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x8, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000403000/0x1000)=nil, 0x1000, 0x1, &(0x7f0000000040), 0x1, 0x3) write$binfmt_misc(0xffffffffffffffff, 0x0, 0xfef0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000200), 0x80400, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) mbind(&(0x7f00006e9000/0x1000)=nil, 0x1000, 0x4000, &(0x7f00000001c0)=0x9, 0xfffffffffffff000, 0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r2, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000230000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x100, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mbind(&(0x7f0000237000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x108a1, 0x100000004, 0xfffffffe, 0x0, 0x1, 0x7, 0x1, 0x0, 0x4, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) [ 360.347497][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.349587][ T37] audit: type=1804 audit(1630757683.445:302): pid=20066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/149/bus" dev="sda1" ino=14744 res=1 errno=0 [ 360.465484][T20116] loop1: detected capacity change from 0 to 16 [ 360.480220][T20118] loop3: detected capacity change from 0 to 6 [ 360.496131][T20121] usb usb9: usbfs: process 20121 (syz-executor.5) did not claim interface 0 before use 12:14:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000005c, 0x68001) [ 360.531020][T20118] FAT-fs (loop3): Directory bread(block 6) failed 12:14:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x100000000000000, 0x0) [ 360.581684][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.606980][T20127] usb usb9: usbfs: process 20127 (syz-executor.5) did not claim interface 0 before use 12:14:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x20000000000000, 0x0) [ 360.628450][ T37] audit: type=1804 audit(1630757683.465:303): pid=20107 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/149/bus" dev="sda1" ino=14744 res=1 errno=0 12:14:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000063, 0x68001) [ 360.686731][T20120] usb usb9: usbfs: process 20120 (syz-executor.2) did not claim interface 0 before use 12:14:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x300, 0x0, 0x0}) 12:14:43 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x30) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ppoll(&(0x7f0000000180)=[{r2, 0x20}], 0x1, &(0x7f00000002c0)={0x0, 0x3938700}, &(0x7f0000000340)={[0x5]}, 0x8) r3 = open(&(0x7f0000000380)='./bus/file0\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x284002, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0xfffffc7a) sendfile(r5, r3, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x20, 0x8, 0x70, 0x5, 0x0, 0x8, 0x400, 0x6, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x4267280e, 0x8000}, 0x40120, 0xa21, 0x7, 0x3, 0x2, 0x800, 0x800, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x7, 0xffffffffffffffff, 0xb) [ 360.743194][T20140] loop1: detected capacity change from 0 to 16 [ 360.750686][ T37] audit: type=1804 audit(1630757683.605:304): pid=20120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/150/bus" dev="sda1" ino=14776 res=1 errno=0 [ 360.805100][T20146] loop3: detected capacity change from 0 to 6 12:14:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000064, 0x68001) 12:14:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x200000000000000, 0x0) [ 360.883912][T20149] usb usb9: usbfs: process 20149 (syz-executor.5) did not claim interface 0 before use [ 360.885330][T20146] FAT-fs (loop3): Directory bread(block 6) failed [ 360.922719][ T37] audit: type=1804 audit(1630757683.765:305): pid=20126 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/150/bus" dev="sda1" ino=14776 res=1 errno=0 [ 360.968860][T20155] usb usb9: usbfs: process 20155 (syz-executor.5) did not claim interface 0 before use 12:14:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x40000000000000, 0x0) 12:14:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x500, 0x0, 0x0}) [ 360.998671][T20161] loop1: detected capacity change from 0 to 16 [ 361.029376][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000069, 0x68001) 12:14:44 executing program 4: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x5, 0xff, 0x5, 0x8, 0x0, 0x6, 0x3040e, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x5, @perf_bp={&(0x7f0000000100), 0x4}, 0x5000, 0x7, 0x1, 0x4, 0x1f, 0x4592, 0x4, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x10004, r0, 0x8) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x8, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mbind(&(0x7f0000403000/0x1000)=nil, 0x1000, 0x1, &(0x7f0000000040), 0x1, 0x3) write$binfmt_misc(0xffffffffffffffff, 0x0, 0xfef0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000200), 0x80400, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) mbind(&(0x7f00006e9000/0x1000)=nil, 0x1000, 0x4000, &(0x7f00000001c0)=0x9, 0xfffffffffffff000, 0x4) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r2, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000230000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x100, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mbind(&(0x7f0000237000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x6}, 0x108a1, 0x100000004, 0xfffffffe, 0x0, 0x1, 0x7, 0x1, 0x0, 0x4, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) [ 361.061332][ T37] audit: type=1804 audit(1630757683.785:306): pid=20120 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/150/bus" dev="sda1" ino=14776 res=1 errno=0 [ 361.100069][T20172] loop3: detected capacity change from 0 to 6 12:14:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x300000000000000, 0x0) 12:14:44 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = syz_open_dev$vcsu(&(0x7f0000000080), 0x6, 0x101) ioctl$sock_inet6_udp_SIOCOUTQ(r4, 0x5411, &(0x7f00000000c0)) r5 = openat$vcsa(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000340)={@private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x6, 0x1f, 0x8, 0x500, 0x3, 0x80000, r6}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@getstats={0x1c, 0x5e, 0x100, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, 0x5}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000050}, 0x24044000) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r7, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 361.127610][T20176] usb usb9: usbfs: process 20176 (syz-executor.5) did not claim interface 0 before use [ 361.160302][T20172] FAT-fs (loop3): Directory bread(block 6) failed [ 361.169234][T20180] usb usb9: usbfs: process 20180 (syz-executor.5) did not claim interface 0 before use 12:14:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000006c, 0x68001) [ 361.202070][T20184] FAT-fs (loop3): Directory bread(block 6) failed 12:14:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x60000000000000, 0x0) 12:14:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x600, 0x0, 0x0}) [ 361.229247][ T37] audit: type=1804 audit(1630757684.325:307): pid=20188 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/152/bus" dev="sda1" ino=14719 res=1 errno=0 [ 361.257526][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x400000000000006f, 0x68001) [ 361.329864][T20197] loop1: detected capacity change from 0 to 16 [ 361.330816][T20198] usb usb9: usbfs: process 20198 (syz-executor.5) did not claim interface 0 before use [ 361.358586][T20202] loop3: detected capacity change from 0 to 6 12:14:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000070, 0x68001) [ 361.371145][ T37] audit: type=1804 audit(1630757684.435:308): pid=20199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/152/bus" dev="sda1" ino=14719 res=1 errno=0 [ 361.403898][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 361.415669][T20202] FAT-fs (loop3): Directory bread(block 6) failed 12:14:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x700, 0x0, 0x0}) 12:14:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x400000000000000, 0x0) [ 361.438169][T20202] FAT-fs (loop3): Directory bread(block 6) failed 12:14:44 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r5, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0xfffffffffffffc70) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x80ffff00000000, 0x0) [ 361.507513][ T37] audit: type=1804 audit(1630757684.465:309): pid=20188 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/152/bus" dev="sda1" ino=14719 res=1 errno=0 [ 361.567996][T20218] usb usb9: usbfs: process 20218 (syz-executor.5) did not claim interface 0 before use [ 361.611036][T20223] usb usb9: usbfs: process 20223 (syz-executor.5) did not claim interface 0 before use [ 361.640449][T20224] loop1: detected capacity change from 0 to 16 [ 361.659931][ T37] audit: type=1804 audit(1630757684.755:310): pid=20229 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/153/bus" dev="sda1" ino=14772 res=1 errno=0 [ 361.665713][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 361.704708][T20231] loop3: detected capacity change from 0 to 6 12:14:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000075, 0x68001) 12:14:44 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0xa002, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000018c0)=""/246) r3 = memfd_create(&(0x7f0000000080)='^\x92\x88jo\x98Y+\xe1k\xf2\xc6\x12\xd8\x98c:d\xc2q\xd9Xk\xbd\x80K\xd4W\xdf&\xdb\xc5\xbc\xb3\\\xf9\xd3\xce\xe3\x81\x97\xee\xff\xa9b\x03\xb5@\x82\x05\xa1O#\x89\xb0\xe1\xe0\xa0#\f\xfa-\x033\xb1\x86\x96Zg\r|/\x9c\xf7@y\xf8c2\xe7\'\xec\ag\x94\x9f\xa0\xcf\xca\xfb\x02\x00'/103, 0x0) pwritev(r3, &(0x7f0000001540)=[{&(0x7f0000000040)='\r', 0x1}], 0x1, 0x80ffe, 0x0) r4 = getpid() ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000180)=0x1) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000000)=0x2) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7f, 0x4, 0xff, 0x1, 0x0, 0x8000, 0x2166, 0xc, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x9, 0x9}, 0x480, 0x9, 0x2, 0x9, 0x6, 0x7, 0xffff, 0x0, 0x7b, 0x0, 0xcb73}, r4, 0xf, r0, 0x0) sendfile(r1, r3, 0x0, 0x102002700) 12:14:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0xa00, 0x0, 0x0}) 12:14:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x500000000000000, 0x0) [ 361.738750][T20231] FAT-fs (loop3): Directory bread(block 6) failed [ 361.773763][T20239] FAT-fs (loop3): Directory bread(block 6) failed [ 361.828294][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 361.832199][T20245] usb usb9: usbfs: process 20245 (syz-executor.5) did not claim interface 0 before use 12:14:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000078, 0x68001) 12:14:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xc0ffff00000000, 0x0) [ 361.881108][T20250] loop1: detected capacity change from 0 to 16 12:14:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x600000000000000, 0x0) 12:14:45 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, 0x4f) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x24000015, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x9}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r5, &(0x7f00000001c0), 0x0) recvmsg$kcm(r5, &(0x7f0000000a80)={&(0x7f0000000080)=@tipc, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000340)=""/253, 0xfd}, {&(0x7f0000000140)=""/104, 0x68}, {&(0x7f0000000440)=""/232, 0xe8}, {&(0x7f00000001c0)=""/58, 0x3a}, {&(0x7f0000000540)=""/151, 0x97}, {&(0x7f0000000600)=""/194, 0xc2}, {&(0x7f0000000700)=""/206, 0xce}, {&(0x7f0000000240)=""/40, 0x28}, {&(0x7f0000000800)=""/135, 0x87}, {&(0x7f00000008c0)=""/225, 0xe1}], 0xa, &(0x7f00000002c0)=""/51, 0x33}, 0x10040) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68002) 12:14:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x1f00, 0x0, 0x0}) [ 361.959824][T20257] usb usb9: usbfs: process 20257 (syz-executor.5) did not claim interface 0 before use [ 361.986342][T20262] loop3: detected capacity change from 0 to 6 [ 362.002309][T20262] FAT-fs (loop3): Directory bread(block 6) failed 12:14:45 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, 0x140c, 0x200, 0x70bd2d, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_CQN={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040000}, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f0000000340)={{r0}, 0x0, 0x0, @unused=[0x1000, 0x1, 0x3f, 0x5], @subvolid=0x80000001}) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) open(&(0x7f00000001c0)='./bus\x00', 0x900, 0x43) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) mmap(&(0x7f0000156000/0x3000)=nil, 0x3000, 0x1000000, 0x110, r3, 0xa0eac000) [ 362.036563][T20262] FAT-fs (loop3): Directory bread(block 6) failed [ 362.054143][T20272] loop1: detected capacity change from 0 to 16 12:14:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x700000000000000, 0x0) 12:14:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xe0ffff00000000, 0x0) [ 362.092413][T20277] usb usb9: usbfs: process 20277 (syz-executor.5) did not claim interface 0 before use [ 362.148732][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 362.179342][T20288] loop1: detected capacity change from 0 to 16 [ 362.213387][T20294] loop3: detected capacity change from 0 to 6 [ 362.225573][T20294] FAT-fs (loop3): Directory bread(block 6) failed [ 362.239653][T20294] FAT-fs (loop3): Directory bread(block 6) failed 12:14:45 executing program 4: ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f00000004c0)={0x3, 0x0, 0x12, 0x5, 0x43, &(0x7f00000000c0)}) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000010008108040f9becdb4cb92e0a48b1003000000069bd6efb2503eaff0d000100020200bf050005001201", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000002200)={&(0x7f0000000d40)=@l2tp6={0xa, 0x0, 0x2, @remote, 0xfffffffd, 0x1}, 0x80, &(0x7f0000002140)=[{&(0x7f0000000dc0)="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", 0x1000}, {&(0x7f0000001dc0)="a80573e8b4a1b22ca6ead7ca2478926082dd998f32db067c600e5863b0707e50f7dd7235ac7633b76ddf4ce015dd20da711b45d258934efbe5bedaa173fc152f329e362d058fe750434bf7708f7b730e54b1485d832fb8585f3d79d18b37b242c61ee4befe4a3e95d63283f4d37a62e1b2246a64873e0a7457027fde9bf5fa16345cf62c548e4e", 0x87}, {&(0x7f0000001e80)="f4253e4f5203da18e854f86b85c46df8e0cba4fd71e7207cb2a00504abfa59b3af8e17e1796b861827f69c6567379a6598d2e1d375e07c12eaa1389d4db5f3b3141733e00bfa2a9b245a53f954e8a8d790de59dd4c4ab1e5dad8349aee045ff70088ba7a782acfc24491efafab60022ba031e4fd5e2cedbe501fa53282c3c0e3b50643b098fd6b263b635e891dcb4530b3d0d8203bd3675cf21ec9a9b2b5b3d3d025", 0xa2}, {&(0x7f0000001f40)="b2ba78e67e04a959e768150c9e5b8a93cd48c45dfdd78bccb077520f5f510b1056c50f95771d58b8d3914e5d2e15df37c9682e89966ecfe91c7a20ec319f", 0x3e}, {&(0x7f0000001f80)="2a25d4efecabab55895fddf23f42ed9849a45af9625f92500bcd5958af7070e0ae5ffac693692b", 0x27}, {&(0x7f0000001fc0)="d582e969fc4cc298cecbee85120a87ca358d174e29a5cf46e6bd99f2b37cbcaa072d223144cc2cfbcd02bd2470bf1462442a962a780103eacfca9e89217cce3c7390e65b0bd017cbaf8a62878ad93066a7fc44b27ec06f31a6ab4968f7d98eb70f42931727ced78098dcef995edf2cadda01e4436701946cc7f4904165bda2a809c7afd7d3e23ea753a0400e82cdd4f3539cbf01706cc4852f51852d36f30c1852fb77893c68707fadc70c5aefa7604d142fa9cbccd4fac2b95500298c3465cec539816c93b85b38f74a19cf845fbd691882", 0xd2}, {&(0x7f00000020c0)="b9a702bdbb72754b4a2ad3849ca11d6493059c5a816520631935d640f3cf5f1c5eb38f77b28db05b770ee56fcc55c4a0a27ee58d00567bba6ff6d94264fe5c78", 0x40}, {&(0x7f0000002100)="f552fba6dd7148009cc0c4", 0xb}], 0x8, &(0x7f00000021c0)}, 0x801) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r1, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='loginuid\x00') readv(r2, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) sendmsg$kcm(r2, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000500)="b70f9964164119c5675799edfd786a1fb64fa2f0d1253e55a3ae9de7b6a17edc8f4a0391f20e549c8d5565cc579ba1af0a8ab785272377e17efc531644a4244fbbe7", 0x42}, {&(0x7f0000000580)="cbae259d248cc2452ddb5561a1b49c86d77d53b45bf3bacb93990452559677f9843e395998fd0c7658b2a48695c947e95765ca7835d77ce1a8bf1b3c8ae7e2487d6f3fff20bbb77972cf5b80a7cadd1f88af67eee39eef3b6b308c69e1d2fe0a23fad78e76565310f98ce60efe2d21151f2ac374fcd05953b3f68d2adf3eaf4f6c69f3105df241a5ab3351b5147ede773abdf00f2db5c4b4b9e0c04ae36f66b94a9f092293270a", 0xa7}, {&(0x7f0000000640)="df84a0ce6620bd5cbc4a92690287a92eea9a56f5e83c7c5ac2883303be6695c4145ee28bec9b340539293b98acd5324b6e20b609173ac8bf7f09e9213dce66dbfb1a7bc85aea83d47a955d4a27d430a05c78be58a1fbd2612503e2267ac9218a774d759e26575b1c29d9db448daf718c15d38486af8f7ebe20c1ca90fa4d164156a769aafdbe2aaabe0755c2fad6ae54c9b1bbf6974576714c25c5abf6f988b8e37b57fce243936125c636e177e077ce0917e97f0dbdb6a6fd4d7d46eb18153e8e4d686b222397cfb16855a97ce0e46e1d370780a2b4ae1ac1601acfcf4f8d756d9b55d55fa9af5c", 0xe8}, {&(0x7f00000007c0)="f03c80228c97d2b689d6ee36f6e69518511d9c514c973078741cf312911004193b4befddc44ec573f4424c125bbb8b787292455a27b9bbc514a29f3dbd931512e497b6c5692a1b3d22203727a843065d5600f019965b2d9978b803dd", 0x5c}, {&(0x7f0000002240)="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", 0xfc}, {&(0x7f00000008c0)="71bb210bbad0e4e13f9cdf724d7d07d4d123ae312861c088e5f5aeb641fac955797a248056ca7e695fb2214d053957a1fcb86db96bb602c22411d375e96caa4ac0191f9e745188b1f86e8db020934ddd4bf09d80ad78c80d4b6a05e521e08d5c955e95f64a36d4d61ead0b3cef1ce25bd26ff3a511269425e969b7e3ffcb1b92da8de0a89831d1a0b4317b1585a35bcb25e93b8627c008c1fa8ee19f8f521fd87e0b5f38ce295b39b1a99894e06c669e59a22f903930f224", 0xb8}, {&(0x7f0000000980)="7bb13f3fb593ddd2f4e17d5995f6bfa9515f069beb61101f20a3c75b2b1ee5269a16109e527630d74c30b39afbdacd9549b77c3836ea872b2254bca983a86e591e136ce3d02ae043d3abce81e9d5c8700ad051dcacd0c3d8be5d0668145ab3b9d284df8d0ced", 0x66}, {&(0x7f0000000a00)="0eedaf85fcda38fac99db655cdec0d6ada7d843a2f7454c08ac2cc6cb3e04f247fd4e11e0046320a9d92b0b1a816190fc10badb629b1716aadd1d14a80193a1561b1bcef55e2eda3f32bc89e7e8e0a318a194090102f35e9d209e4980a2544e59375681a0bc31e1e5521509c04a2cfe6c2297335162a8950e358042a2ad72fd7531a90a96cf52bedb155893346a025f5b02d88b0a3f3c75251385caf17", 0x9d}, {&(0x7f0000000ac0)="ad11a4bdb59699146d6a3e89078c0377b0aeac04627cc68e8c6961f42c99229ed1bd583f0fff4acdfce739e8b8d850acdfb8a84dfb2937906330102f6f8138a331fd6fa106df8c363802c9de2b3e49f22329dcc1866872d0a86f35a6e0d850618b3bbce218d133f9c06dff13675a58b31ad2bffd7891e39a719f6d6eb1a0b253a6c2d01e34a4d864c9ba90bc74066a920e97f220b81ce08d00b44a216cc921d3e0a5ecec520923bfe7b5a6a36d2e4a6376223aa2e503992e9ebd804119a30f60fb0983a042317c3b2229", 0xca}, {&(0x7f0000000bc0)="78dfaf9b95378c2cdf39088bff6c10b5244144374bda6ca3a3daa9e43136501bc857dc4f1b27dc1372db4cce3fb21f91db976f2b8404a65dae2fb76f33932f1e0adaa3f141368d266c7a99df88fc1817e8", 0x51}], 0xa}, 0x1) 12:14:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68003) 12:14:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x2000, 0x0, 0x0}) 12:14:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x800000000000000, 0x0) 12:14:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf0ffffffffffff, 0x0) 12:14:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x900000000000000, 0x0) 12:14:45 executing program 4: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x0, 0x4c82ea530285fe45, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=0x0], 0x50}}, 0x20000800) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@multicast1=0xe0000300, @local}, 0xc) r1 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x4, 0xc08c1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x54f1e41d85217f65}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r2, 0x800, 0x70bd2a, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40a4}, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) dup(r0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000280)) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10440}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@local, @loopback}, 0xc) write(r3, &(0x7f0000000000)="05", 0xe7b78) [ 362.365017][T20316] loop1: detected capacity change from 0 to 16 [ 362.391986][T20322] loop3: detected capacity change from 0 to 6 [ 362.396117][T20321] usb usb9: usbfs: process 20321 (syz-executor.5) did not claim interface 0 before use 12:14:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68004) 12:14:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x3f00, 0x0, 0x0}) [ 362.438184][T20328] usb usb9: usbfs: process 20328 (syz-executor.5) did not claim interface 0 before use [ 362.452213][T20322] FAT-fs (loop3): Directory bread(block 6) failed [ 362.537544][T20337] usb usb9: usbfs: process 20337 (syz-executor.5) did not claim interface 0 before use [ 362.538247][T20339] loop1: detected capacity change from 0 to 16 [ 362.596144][T20344] usb usb9: usbfs: process 20344 (syz-executor.5) did not claim interface 0 before use [ 362.980712][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:14:46 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0xb0840, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:46 executing program 4: r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x0, 0x4c82ea530285fe45, 0x0, 0x0, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x20}}, 0x0) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=0x0], 0x50}}, 0x20000800) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@multicast1=0xe0000300, @local}, 0xc) r1 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x4, 0xc08c1) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x54f1e41d85217f65}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r2, 0x800, 0x70bd2a, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40a4}, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) dup(r0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000280)) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10440}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)={@local, @loopback}, 0xc) write(r3, &(0x7f0000000000)="05", 0xe7b78) 12:14:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x100000000000000, 0x0) 12:14:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68005) 12:14:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xa00000000000000, 0x0) 12:14:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x4800, 0x0, 0x0}) [ 363.217084][T20366] loop3: detected capacity change from 0 to 6 [ 363.241362][T20369] loop1: detected capacity change from 0 to 16 [ 363.248439][T20365] usb usb9: usbfs: process 20365 (syz-executor.5) did not claim interface 0 before use 12:14:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xc00000000000000, 0x0) [ 363.262658][T20366] FAT-fs (loop3): Directory bread(block 6) failed [ 363.279668][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 363.282451][T20366] FAT-fs (loop3): Directory bread(block 6) failed 12:14:46 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r4, r2, 0x0, 0x2000800100020004) 12:14:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68007) 12:14:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x200000000000000, 0x0) 12:14:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x4c00, 0x0, 0x0}) [ 363.319263][T20376] usb usb9: usbfs: process 20376 (syz-executor.5) did not claim interface 0 before use 12:14:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68008) [ 363.433822][T20384] loop1: detected capacity change from 0 to 16 [ 363.451951][T20392] usb usb9: usbfs: process 20392 (syz-executor.5) did not claim interface 0 before use [ 363.460243][T20394] loop3: detected capacity change from 0 to 6 12:14:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c2020202010f7538ac33241325100a3e670325100a686b366002330912d0f69086c00650030008afe45ebf1cd311effffffffffffff0000ffffffff46494c453079b8cb8f01325881ffc26f2fd315017c7726a75e8dbd9551816b51e52a459e4388c4d177055253bf353f3abcf56fb60ccbdeded3299e3f400393b1ccafd04245559609b8b6e5dbba25fd4cbff8ce63db2275cbc7c80ee3e055db84b8092922e5fbb7b8e63826c6118fa69afdb129587f4fcad65d277304a3b51926d7b46445bd6a24584b807df3c75a847e997f6d396697dcbf33aab33774ec794bca6310dfdaf824dc20032a2ae0c72137ce3744920a105a39879f7a5ecc96e5f3b472a4f14ff3dc5cd70560d78f85072b58c9a868150fe3752d9593df71b48cbb73ae396c620cc298e90ba692bbac2318497e48b53e9deee46c38fc7c4cda3febc95279b7ba2203022343f4aea18dab85fda83bedb81ec27f3f498d82ca892a495203d899aad0ef90659d2366627cd24860d2c464fa546d84c63056918326dd9a2eeac4a8606e127473c22db4b08a35eca0a91801dabc03a99aa9ffccdd727f", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xd00000000000000, 0x0) [ 363.491655][T20397] usb usb9: usbfs: process 20397 (syz-executor.5) did not claim interface 0 before use [ 363.513459][T20394] FAT-fs (loop3): Directory bread(block 6) failed [ 363.537684][T20394] FAT-fs (loop3): Directory bread(block 6) failed [ 363.594708][T20407] loop1: detected capacity change from 0 to 16 12:14:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/201, 0xc9}], 0x1, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) getpriority(0x1, r1) process_vm_readv(r1, &(0x7f0000002540)=[{0x0}, {&(0x7f0000002440)=""/246, 0xf6}], 0x2, &(0x7f00000047c0)=[{&(0x7f00000025c0)=""/4096, 0x1000}], 0x1, 0x0) 12:14:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x6000, 0x0, 0x0}) 12:14:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x300000000000000, 0x0) 12:14:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68014) 12:14:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf00000000000000, 0x0) [ 363.683806][T20417] loop3: detected capacity change from 0 to 6 [ 363.696949][T20417] FAT-fs (loop3): Directory bread(block 6) failed [ 363.707919][T20424] usb usb9: usbfs: process 20424 (syz-executor.5) did not claim interface 0 before use [ 363.721484][T20417] FAT-fs (loop3): Directory bread(block 6) failed [ 363.732338][T20425] loop1: detected capacity change from 0 to 16 12:14:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x400000000000000, 0x0) [ 363.755865][T20430] usb usb9: usbfs: process 20430 (syz-executor.5) did not claim interface 0 before use [ 363.828953][T20436] loop3: detected capacity change from 0 to 6 [ 363.841635][T20436] FAT-fs (loop3): Directory bread(block 6) failed [ 363.850463][T20436] FAT-fs (loop3): Directory bread(block 6) failed 12:14:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) accept$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, 0x0) r0 = perf_event_open(0x0, 0x0, 0xfffffffffffffff8, 0xffffffffffffffff, 0x2) shmget$private(0x0, 0x3000, 0x0, &(0x7f00002b3000/0x3000)=nil) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000001940)={0x7fffffff, 0x2, {}, {0xee01}, 0x6b}) timer_create(0x4, &(0x7f0000000300)={0x0, 0x1d, 0x4, @thr={&(0x7f0000001380)="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", &(0x7f0000001280)="fdb66ec8a7ab4e1c9edb8eb506c0a3300691a871eba695a9dbf04d8b1fe8f1e6ccc335af928d17b3d50f271684aaecbd4fc73fdb5c2a1b210634ed8a5a61102fd01550fb2f3f77e340cf4c2a66bbd785ecdf91133fc960b8e783dbac45aa0cc75416553e14a898ed382bee9264f277d487ebf24d3426ccec6ac2c47d737ac1135af669f3978a87c13415cb7b1b87ca9a64e178a998a73e174838fec2b648e651eaed88f6e76167b2f3b45c76e3d4c1bc9e06742efc1df1f6b1313ac563b673e0167c05955b0a95"}}, &(0x7f0000000080)) timer_settime(0x0, 0x1, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) dup3(r0, r1, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000000380)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) timer_create(0x5, &(0x7f0000001200)={0x0, 0x20, 0x2}, &(0x7f0000001240)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000000c0)={0x0, "72c8962df97c89a96102dbcb535b07b0"}) 12:14:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x6800, 0x0, 0x0}) 12:14:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1100000000000000, 0x0) 12:14:47 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = accept4$inet(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x80000) mmap(&(0x7f00000c5000/0x1000)=nil, 0x1000, 0x300000d, 0x110, r2, 0x69ee2000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f0000000340)={0x0, 0x3, @start={0x0, 0x1, "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", "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"}, [0x4, 0x1, 0x401, 0x1, 0x2, 0x9950, 0x20, 0x0, 0x5, 0x8, 0x3f, 0xfffffffffffffffd, 0xff, 0x3, 0x100, 0x3, 0x1, 0xfff, 0x0, 0x1, 0x101, 0x2, 0x9, 0xff, 0x1, 0x1f, 0x0, 0x5, 0xef, 0x1, 0xfffffffffffffffc, 0x3, 0x5, 0x400, 0x4, 0x40, 0x7, 0x2, 0x0, 0x1f, 0x7fff, 0x7, 0xfffffffffffff29c, 0x4, 0x9, 0xfd8f, 0x10001, 0x80, 0x80, 0x8, 0x5, 0x800, 0x2, 0x1, 0x4000000000000003, 0x6, 0x10000, 0x9, 0x2, 0x100000000, 0x6, 0x4, 0x4, 0x7]}) r3 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r5, r3, 0x0, 0x2000800100020004) socket$inet(0x2, 0xa, 0xfbf2) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r0}, 0x8) getpeername$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x500000000000000, 0x0) [ 364.347630][T20457] usb usb9: usbfs: process 20457 (syz-executor.4) did not claim interface 0 before use [ 364.369159][T20461] loop3: detected capacity change from 0 to 6 [ 364.374991][T20460] loop1: detected capacity change from 0 to 16 [ 364.391470][T20459] usb usb9: usbfs: process 20459 (syz-executor.5) did not claim interface 0 before use [ 364.406635][T20461] FAT-fs (loop3): Directory bread(block 6) failed [ 364.435034][T20469] usb usb9: usbfs: process 20469 (syz-executor.5) did not claim interface 0 before use 12:14:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fallocate(r0, 0x51, 0xfffffffffffff36e, 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) syz_mount_image$hfs(&(0x7f0000000240), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000001740)={[{@uid={'uid', 0x3d, r2}}]}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x5, &(0x7f0000000500)=[{&(0x7f0000000100)="da2ca6eee94b6f73e72bc239865d806c9526e1049374fad9e432c7c7a2be81981146277505cac0e4b79b2e3d7b0475e3f9842788e9fc46cb148e258d0b8656b5c26affab91c90174b0d180347c1b911150b6212b7277a3eca3b3fb3d92cd77f4153e02d12d9d97601604c93c0cd81a5b37dff370dbba4a619e8d297f519586f5204bee7a0c8a7d402100693e688cc7d5a2a7b12250fda64e", 0x98, 0xece}, {&(0x7f00000001c0)="ed6262e1e1b1154602d861527c6415d30e25f885a33d38590e4617567e8c41f5f4a34991f2de6d131a0b67e21ae5e0163b6609b3d8cfcb70508a88d91bbfafeeb51c6658aebe9d9338eac39dac28bfc4e79d4912bc4a016417dd21520cdf1bbf78a617fbb72a0b348311ad5784df5b8588f6036c96f38d3faf8fd4c3b57c0cd0ad4025bc72e75b74a39ebc689c48ce33b814d4ce5ab293afa05eb912fcdc3e293c0347ae7bc4d39a5fa5720bffa592751ed0c35c80cb8d3b100268e4ccc42bf73c00f2e78406405e81ca57b72fbec596df1bbae89fbffec87e92b24ce1a77864eb586a4c58bc75b9f61bb45d70b77c1bb297", 0xf2, 0x3f}, {&(0x7f00000002c0)="69266884a49be8a2b665a21e25c96a99442a5b2079f862e7eff446dd53ab01808ac060454b079da7113d57a2ddba00275c78448068375df8d41e3349e08ac24c5a03884feec3f48ae83ca35beea68c27e7be4c57272001c54227dac2876c73e5640459e4b2fd9150a9dddd246b5177e7d618a10b9ac803fb41b0cca35760c5e13ab453ed79052e366e85341fdb6f2b30a7760542e4aac4440197aba36ba9894b2c0cbd2bf9b6bff5a3919e94dd8c86d32b0dbafff9673845a5eba9d3b30296010be52b4b", 0xc4, 0x100000000007}, {&(0x7f00000003c0)="8dc6c16d83d47af3a62f8bb0facbcbb6cd0700404cefc975e53b9ca9dc9fa03aed3c448207954565cf014ee79e3660e6e203c57c71691fdab628ac7c99ec81987dd298eb52d5badd89af16128c8e5a199e5cb897e18e59695df2a696fa4706f90f1960831bdcc29f53b627c2e709b0ca80212e50871c7dc333fb74c1db38f61e9c8749168921fcab39713fc09bd97e2abdc89894bec9d79b3f448982e3a6f43d20c45fcdc562c9192df2d8", 0xab, 0x8001}, {&(0x7f0000000480)="ce65625a96003d1194ee1f1de0bd63c8a8fb1f946a28e00ee20f3e50a57066f7044b6726f3f801101df2c0353edb556c26f854cc821297ffd2b2ed9203abbaadd9e00a297a779f7f34fccff7dd56c5afed85eb41b0d37862d6d62bd1eb3d569530395187c35470b0", 0x68, 0x3}], 0x40001, &(0x7f0000000580)={[{@stripe={'stripe', 0x3d, 0x9a8}}, {@nodelalloc}, {@sysvgroups}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x56c0}}, {@nomblk_io_submit}, {@noauto_da_alloc}, {@data_writeback}, {@test_dummy_encryption}, {@data_ordered}, {@sysvgroups}], [{@audit}, {@fowner_lt={'fowner<', r2}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@pcr={'pcr', 0x3d, 0x13}}]}) 12:14:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1300000000000000, 0x0) [ 364.462851][T20461] FAT-fs (loop3): Directory bread(block 6) failed 12:14:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x600000000000000, 0x0) 12:14:47 executing program 4: ioctl$TCSETAF(0xffffffffffffffff, 0x560e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r1, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x3, 0x9, 0xa5, 0xd0, 0x0, 0xffffffffffffff42, 0x80400, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x7, 0x9000000000000000}, 0x4004, 0x2, 0x81, 0x5, 0xfffffffffffffffa, 0xab, 0x1, 0x0, 0x8, 0x0, 0x1f}, r0, 0x2, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x3, 0x2, 0x8, 0x4, 0x0, 0x5, 0x4c4, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x4, 0x1}, 0x2040, 0x8, 0x80, 0x7, 0x0, 0x2, 0x8, 0x0, 0x5, 0x0, 0x1}, r0, 0x3, r3, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') preadv(r4, &(0x7f00000017c0), 0x218, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000200)={0x0, 0x0, 0xffffffffffffffff}) dup2(r5, r2) 12:14:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x6c00, 0x0, 0x0}) [ 364.520612][T20476] hfs: uid requires an argument [ 364.529660][T20476] hfs: unable to parse mount options [ 364.535912][T20477] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) [ 364.586852][T20476] loop0: detected capacity change from 0 to 264192 [ 364.600891][T20488] loop1: detected capacity change from 0 to 16 [ 364.632985][T20501] usb usb9: usbfs: process 20501 (syz-executor.5) did not claim interface 0 before use [ 364.649770][T20503] loop3: detected capacity change from 0 to 6 [ 364.665925][T20498] loop0: detected capacity change from 0 to 264192 12:14:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1800000000000000, 0x0) 12:14:47 executing program 4: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x101, 0x1, 0x1, 0x0, 0xf, "01eb0000e0e4ffffffffff00000300"}) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x40, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100, 0x0, 0x7, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x101042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40810ffe) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x7}], 0x24d) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x6) [ 364.686924][T20503] FAT-fs (loop3): Directory bread(block 6) failed [ 364.702386][T20503] FAT-fs (loop3): Directory bread(block 6) failed 12:14:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x700000000000000, 0x0) 12:14:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r0, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) r1 = openat$vcsa(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wg1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000340)={@private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x6, 0x1f, 0x8, 0x500, 0x3, 0x80000, r2}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x68, 0x0, 0x100, 0x70bf27, 0x25dfdbfb, {}, [{{0x8}, {0x4}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x4020}, 0x20000040) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 364.760665][T20520] loop1: detected capacity change from 0 to 16 12:14:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x212040, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r2, &(0x7f00000001c0)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) connect(r1, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @broadcast}, 0x3, 0x4}}, 0x80) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x81, 0x0) preadv(r3, &(0x7f0000000180)=[{&(0x7f0000000280)=""/127, 0x7f}], 0x1, 0x8, 0xf2b) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) [ 364.857849][T20531] loop3: detected capacity change from 0 to 6 [ 364.880344][T20531] FAT-fs (loop3): Directory bread(block 6) failed [ 364.895485][T20531] FAT-fs (loop3): Directory bread(block 6) failed 12:14:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000580)="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", 0x1c1, 0x1000}], 0x2000080, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0x1f00000000000000, 0x0) 12:14:48 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'wlan1\x00'}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c00000010528e7ac0fc83f3bf421d73ff5a5b82b6b9b77bd8773e125499227205775d95ec907201914b71e351d1d3b3acfbae3450bcfacd", @ANYRES16=r1, @ANYBLOB="2d630000000000000000b205000008000300", @ANYRES32=r2, @ANYBLOB="a77d2cb7cfe6be13411a7e5da8f6d494503f2028a167a467e11a57cb7865116a2976c5d424c2003c25a698d003ba638ce6e2902db5ed78fecb89d63100ad9830952d22075bea84"], 0x1c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="2001000010000104000000000400000000000000", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB], 0x120}}, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)=@getchain={0x3c, 0x66, 0x200, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xffff, 0x8}, {0x4, 0xf}, {0x7, 0x2}}, [{0x8, 0xb, 0x901b}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x2, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x949e7c938ea59ce8}, 0x200000c4) r5 = socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x44, r4}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x2d000000, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x138, 0x10, 0x401, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x108, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xf8, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x88, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x5}}]}, @IFLA_VLAN_EGRESS_QOS={0x64, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2be5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x80000000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x8}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x3000}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x5, 0x2ed9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0xa}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xad4c, 0x5}}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x138}}, 0x0) 12:14:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080), 0xff, 0x64000) accept(r1, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read$FUSE(r1, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f00000021c0)={0x10001, 0x8, {}, {0xee01}, 0x2, 0x100000001}) write$FUSE_ATTR(r0, &(0x7f0000002200)={0x78, 0x0, r2, {0x10001, 0xffff, 0x0, {0x2, 0x8, 0x3, 0x7, 0xfff, 0x7, 0xfffffffb, 0x5b, 0x80, 0xa000, 0x1, r3, 0xffffffffffffffff, 0x8000000, 0x7}}}, 0x78) syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) 12:14:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000010d00)=ANY=[]) mknod$loop(&(0x7f00000000c0)='./file0/file0/file0\x00', 0xf00000000000000, 0x0) 12:14:48 executing program 2: r0 = open(&(0x7f0000001980)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}]}, 0x24}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b254d7465bf15b38b233dd3942bdfb77c34f15e5a49c552b21acc9677693d901e94d6910c8f3f5ad8b60ddb893f47b0eb1de77aa1272f0e5e92f51fefe08892c37b182f4fc22515fa7a07ceba5eb66b8917886f8e19fd4808dd98c67e46fa795481da46398f754ec0350756ff16341b251c95ecd809c7a3a16e76d1af6c86320470afce18c6c35192e7764fe84a44a3b", @ANYRES16=r3, @ANYBLOB="020000000000000015000600000008000300", @ANYRES32=r4, @ANYBLOB="0800050003000000"], 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x44, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x7, 0x53}}}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x6, 0x7}}, @NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x7, 0xf2}}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x80}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = open(&(0x7f0000000300)='./bus\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000100)='bond_slave_1\x00', 0x10) sendfile(r7, r5, 0x0, 0x2000800100020004) creat(&(0x7f0000000200)='./bus\x00', 0x0) 12:14:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_BULK(r1, 0xc0105502, &(0x7f0000000480)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) write$binfmt_script(r1, &(0x7f0000000100)={'#! ', './file0', [{0x20, '/dev/bus/usb/00#/00#\x00'}, {0x20, '/dev/bus/usb/00#/00#\x00'}], 0xa, "18f6b753e9a2653647ce11df67a116d36711943f5ffe957ab25d97d46899ee10517001f6d7bede1615c9b4dc69061fcdd91f3bb91c7c41d55fdc53b873e19266b56653a83dd8abd247c8645a3c1a6821b8505e48393ab8590347b6eaff3b626451a66980f27acdfbdd8832d0f776cae55322122d40eb355f9c3e9140561288fbdcf445867ef91c1026a81bef86b6f0d8410ede4371e7b9521e0ca066af16844e30e47f3c03a38baf2a7aab7e1fcbca3d0c70d1aa7e8e"}, 0xed) mmap(&(0x7f00002e9000/0x2000)=nil, 0x2000, 0x3800003, 0x20010, r0, 0xc72de000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) write(r2, &(0x7f0000000080)="1dc4033348e2263c137e234e122b7c6248f34c988e5e838f248ccebe195bc021ec67e38b6f035871bb597b094482654def6ced7966c5a6055c78561952ffd56230f64ea52e6ba50be6a392d5f8086cde68b259c67f924f534c3f8f7557db6acab7753ff60b1c363bbbe205da5c28d0c51c6a049120e9", 0x76) [ 365.390806][T20559] loop3: detected capacity change from 0 to 6 [ 365.401142][T20559] FAT-fs (loop3): Directory bread(block 6) failed [ 365.410201][T20559] FAT-fs (loop3): Directory bread(block 6) failed [ 365.418471][T20564] loop1: detected capacity change from 0 to 16 [ 365.461197][ T37] kauditd_printk_skb: 21 callbacks suppressed [ 365.461212][ T37] audit: type=1804 audit(1630757688.555:332): pid=20562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/159/bus" dev="sda1" ino=14821 res=1 errno=0 [ 365.522502][ C1] net_ratelimit: 4 callbacks suppressed [ 365.522519][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 365.539920][T20571] usb usb9: usbfs: process 20571 (syz-executor.5) did not claim interface 0 before use [ 365.572826][T20573] usb usb9: usbfs: process 20573 (syz-executor.0) did not claim interface 0 before use [ 365.591983][T20576] usb usb9: usbfs: process 20576 (syz-executor.0) did not claim interface 0 before use [ 365.634335][ T37] audit: type=1804 audit(1630757688.735:333): pid=20574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/159/bus" dev="sda1" ino=14821 res=1 errno=0 [ 366.225605][ T37] audit: type=1804 audit(1630757689.325:334): pid=20574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/159/bus" dev="sda1" ino=14821 res=1 errno=0 [ 366.229294][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 366.292882][ T37] audit: type=1804 audit(1630757689.325:335): pid=20574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir311785698/syzkaller.dm1tZK/159/bus" dev="sda1" ino=14821 res=1 errno=0 [ 377.805403][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 377.812025][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 [ 395.253711][T10454] Bluetooth: hci2: command 0x0406 tx timeout [ 415.733661][T10368] Bluetooth: hci0: command 0x0406 tx timeout [ 439.244946][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.251507][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 [ 472.053621][ T8952] Bluetooth: hci3: command 0x0406 tx timeout [ 500.686124][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 500.692523][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 [ 527.563777][ T1658] INFO: task syz-executor.5:20501 blocked for more than 143 seconds. [ 527.572336][ T1658] Not tainted 5.14.0-syzkaller #0 [ 527.580056][ T1658] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 527.588850][ T1658] task:syz-executor.5 state:D stack:27840 pid:20501 ppid: 8444 flags:0x00004004 [ 527.598369][ T1658] Call Trace: [ 527.601730][ T1658] __schedule+0x940/0x26f0 [ 527.606376][ T1658] ? io_schedule_timeout+0x140/0x140 [ 527.611658][ T1658] ? _raw_spin_unlock+0x24/0x40 [ 527.616537][ T1658] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 527.622339][ T1658] ? trace_hardirqs_on+0x5b/0x1c0 [ 527.628244][ T1658] schedule+0xd3/0x270 [ 527.632327][ T1658] schedule_timeout+0x1db/0x2a0 [ 527.637841][ T1658] ? usleep_range+0x170/0x170 [ 527.642862][ T1658] ? wait_for_completion_timeout+0x169/0x280 [ 527.649069][ T1658] ? lock_downgrade+0x6e0/0x6e0 [ 527.654637][ T1658] ? do_raw_spin_lock+0x120/0x2b0 [ 527.659688][ T1658] ? rwlock_bug.part.0+0x90/0x90 [ 527.665160][ T1658] ? _raw_spin_unlock_irq+0x1f/0x40 [ 527.670556][ T1658] ? trace_hardirqs_on+0x5b/0x1c0 [ 527.676145][ T1658] wait_for_completion_timeout+0x171/0x280 [ 527.682266][ T1658] ? wait_for_completion+0x280/0x280 [ 527.687637][ T1658] ? lockdep_init_map_type+0x293/0x7b0 [ 527.693121][ T1658] usb_start_wait_urb+0x144/0x4c0 [ 527.698371][ T1658] ? lock_downgrade+0x6e0/0x6e0 [ 527.703481][ T1658] ? rcu_read_unlock+0x9/0x60 [ 527.708233][ T1658] ? usb_api_blocking_completion+0xa0/0xa0 [ 527.714124][ T1658] ? memset+0x20/0x40 [ 527.718221][ T1658] usb_bulk_msg+0x226/0x550 [ 527.722723][ T1658] do_proc_bulk+0x3a3/0x750 [ 527.728201][ T1658] ? processcompl_compat+0x680/0x680 [ 527.733594][ T1658] usbdev_ioctl+0x990/0x36c0 [ 527.738207][ T1658] ? do_proc_control+0x9f0/0x9f0 [ 527.743147][ T1658] ? __sanitizer_cov_trace_switch+0x63/0xf0 [ 527.749152][ T1658] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 527.755497][ T1658] ? do_vfs_ioctl+0x132/0x15d0 [ 527.760442][ T1658] ? vfs_fileattr_set+0xbe0/0xbe0 [ 527.765628][ T1658] ? lock_downgrade+0x6e0/0x6e0 [ 527.770746][ T1658] ? lock_acquire+0x442/0x510 [ 527.775483][ T1658] ? rcu_read_lock_sched_held+0xd/0x70 [ 527.780946][ T1658] ? lock_release+0x522/0x720 [ 527.786196][ T1658] ? ZSTD_compressBlock_lazy2.cold+0x72c/0x2e07 [ 527.792486][ T1658] ? __fget_files+0x23d/0x3e0 [ 527.797713][ T1658] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 527.804357][ T1658] ? do_proc_control+0x9f0/0x9f0 [ 527.810093][ T1658] __x64_sys_ioctl+0x193/0x200 [ 527.815068][ T1658] do_syscall_64+0x35/0xb0 [ 527.819495][ T1658] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 527.825449][ T1658] RIP: 0033:0x4665f9 [ 527.829683][ T1658] RSP: 002b:00007f9d03088188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 527.838164][ T1658] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 527.846202][ T1658] RDX: 0000000020000480 RSI: 00000000c0105502 RDI: 0000000000000004 [ 527.854388][ T1658] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 527.862353][ T1658] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 527.870404][ T1658] R13: 00007ffc7b8732df R14: 00007f9d03088300 R15: 0000000000022000 [ 527.878645][ T1658] INFO: lockdep is turned off. [ 527.883390][ T1658] NMI backtrace for cpu 0 [ 527.887692][ T1658] CPU: 0 PID: 1658 Comm: khungtaskd Not tainted 5.14.0-syzkaller #0 [ 527.895649][ T1658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.905944][ T1658] Call Trace: [ 527.909207][ T1658] dump_stack_lvl+0xcd/0x134 [ 527.913898][ T1658] nmi_cpu_backtrace.cold+0x47/0x144 [ 527.919163][ T1658] ? lapic_can_unplug_cpu+0x80/0x80 [ 527.924344][ T1658] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 527.930307][ T1658] watchdog+0xc1d/0xf50 [ 527.934465][ T1658] ? reset_hung_task_detector+0x30/0x30 [ 527.939992][ T1658] kthread+0x3e5/0x4d0 [ 527.944041][ T1658] ? set_kthread_struct+0x130/0x130 [ 527.949218][ T1658] ret_from_fork+0x1f/0x30 [ 527.954102][ T1658] Sending NMI from CPU 0 to CPUs 1: [ 527.959327][ C1] NMI backtrace for cpu 1 skipped: idling at acpi_idle_do_entry+0x1c6/0x250 [ 527.960886][ T1658] Kernel panic - not syncing: hung_task: blocked tasks [ 527.977879][ T1658] CPU: 1 PID: 1658 Comm: khungtaskd Not tainted 5.14.0-syzkaller #0 [ 527.985839][ T1658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.995977][ T1658] Call Trace: [ 527.999239][ T1658] dump_stack_lvl+0xcd/0x134 [ 528.003904][ T1658] panic+0x2b0/0x6dd [ 528.007777][ T1658] ? __warn_printk+0xf3/0xf3 [ 528.012443][ T1658] ? lapic_can_unplug_cpu+0x80/0x80 [ 528.017710][ T1658] ? preempt_schedule_thunk+0x16/0x18 [ 528.023065][ T1658] ? nmi_trigger_cpumask_backtrace+0x191/0x220 [ 528.029396][ T1658] ? watchdog.cold+0x130/0x158 [ 528.034239][ T1658] watchdog.cold+0x141/0x158 [ 528.038901][ T1658] ? reset_hung_task_detector+0x30/0x30 [ 528.044530][ T1658] kthread+0x3e5/0x4d0 [ 528.048584][ T1658] ? set_kthread_struct+0x130/0x130 [ 528.053764][ T1658] ret_from_fork+0x1f/0x30 [ 528.069217][ T1658] Kernel Offset: disabled [ 528.073565][ T1658] Rebooting in 86400 seconds..