openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x5100, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r4 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r5) r6 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r6, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r6, 0x20000003) r7 = accept4(r6, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r7, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={0x0, 0x2}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f00000003c0)={r8, @in6={{0xa, 0x4e24, 0x2, @rand_addr="c0a555ff427fa0a54f69792a217641e2", 0x8}}, 0x7, 0x952a}, 0x90) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000340)={0x3, {0xf832, 0x0, 0x2, 0x4}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') accept4$ax25(r0, &(0x7f0000000200)={{0x3, @rose}, [@netrom, @bcast, @default, @remote, @null, @null, @null, @default]}, &(0x7f0000000280)=0xfffffffffffffec4, 0x0) socket(0x10, 0x0, 0x8) [ 299.910039][ T7801] device hsr_slave_0 entered promiscuous mode [ 299.995079][ T7801] device hsr_slave_1 entered promiscuous mode [ 300.131012][ T7801] debugfs: Directory 'hsr0' with parent '/' already present! [ 300.220716][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.230085][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.291405][ T7895] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.300206][ T7895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.365652][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.421802][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.464995][ T7895] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.472345][ T7895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.527511][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 300.605335][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 300.649501][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.692507][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.791646][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 300.800452][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.873218][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 300.931295][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 300.939564][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 301.011402][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.035067][ T7781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.081591][ T7984] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 301.157348][ T7775] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 301.215788][ T7775] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.302830][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.346040][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.384687][ T7781] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.441343][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.449313][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.511068][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 301.518780][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 301.647570][ T7775] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 301.711260][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 301.719895][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.810009][ T7773] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.817186][ T7773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.935286][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 301.994588][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.061077][ T7773] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.068386][ T7773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.216687][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.233983][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.294722][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.365281][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 302.423996][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.472428][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 302.531849][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.585068][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 302.631943][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.673972][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 302.731597][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 302.746659][ T7781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 303.052171][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 303.294813][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 303.312283][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 303.323163][ T7781] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 303.358924][ T7801] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.455855][ T8039] Unknown ioctl 1077980793 [ 303.501399][ T8041] Unknown ioctl 1077980793 [ 303.521700][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.561191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:02:13 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/58) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)={'raw\x00', 0xcd, "0a5c034f2d88fee4f8a833cdf0000891a8d0037e3676c7768c287840864fa1d26dcbc51e58d5dc5ae9db21e4590c5b268497878ab635b666dbdf5902ee7a87d77466bfc33bb0572f89bac7583f736680a819295eb373a5f1df1ac9d0cf9f2c3316a20bc07870805e8fdefb08028ccbbed5f731532730e2cce1215ef5bf17ac27383497da0175bc07dffa16ac70bd6fb7cc2cc14d5f191e758368dd7dffa7777ee84c2312d08418597fb275c06b0ad405bb4e5416bdc9f07964fa4cd996aa236f9608e76af761988a86f535ace9"}, &(0x7f0000000180)=0xf1) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f00000001c0)=""/196, 0xc4}, &(0x7f00000002c0), 0x2}, 0x20) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000340)={0x0, 0x0, [], @raw_data=[0x80000000, 0x4d9f, 0x0, 0x1, 0x4, 0x80, 0x5, 0x45, 0x0, 0xfffffffa, 0xaa, 0xda, 0x80000001, 0x10000, 0xfffffff8, 0x4, 0xffff, 0x3ff, 0x6, 0x20000, 0xafa, 0x7298, 0x3, 0x9a30, 0x6, 0x0, 0x583, 0x8, 0x80000001, 0x3, 0x1ff, 0x20]}) sendmsg$FOU_CMD_GET(r0, &(0x7f00000004c0)={&(0x7f0000000400), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @dev={0xfe, 0x80, [], 0x11}}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x30}, 0x1, 0x0, 0x0, 0x10004891}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = accept4(0xffffffffffffffff, &(0x7f0000000e00)=@hci={0x1f, 0x0}, &(0x7f0000000e80)=0x80, 0xc0800) sendmsg$inet(r1, &(0x7f0000000f80)={&(0x7f0000000500)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000a40)=[{&(0x7f0000000540)="a4ed22e27f235e6011d5f64d207e67e6dee1233d66a036cab4369b33ec6b3497ffe9e5f17bbc7dbc83d8a8f93f2c0be368ac845e97bb0e67cf9dacc00174bc50786542dc8996db22be2daa116fd97c7b88d718b07fece27463cde80fb4b6ff46d75142b8b071d2163a0454e7609b03025b66d0ce5ea100f6f5207a22eb1ef50615354b8b387be865e0b8d00e3095f36d9e07fa5cdff1c427bbca0156798ae668a8ce872f84d82ec1830e24388857ba8018ae99307fa157f0a4fac073748869fc0a1974d9b624b751699f672e9b457c70419552dbffa15b9df7054d4f9f209755b3dfe5f9d0cb36746da6", 0xea}, {&(0x7f0000000640)="f9c8f163e3d42a965ade75519cd1945c4eef3c5f39ccd685f09875e5a284cddef8d83c39f803dfab6f9cc25b5dae8df843edfdeec54b1b9ffe2bbdc0eae285250dfdcad7efb0911c3fc410bbda2dd316bcc69976e5d6239001a3d445295ac8b7048f86b64e35f29ad2de1e88f122a97ba8969440aeb9867cb2a0c6", 0x7b}, {&(0x7f00000006c0)="d8050c759dadbd54e0fc6ff118112749de327acd60533f8634b27106b59bb71f40f0d74dbc8d5081ab19793a532a0b17116e1dd6a78a0b87ac5ea0d7cb43f675f688b604355b33f6f91da36a00487b6eb7aae1e21cd2b09673b9e86efe2940963d950cd2d9293d7c136831284e3d1ec4a0fc844cfbe0e7408d3a4b7dcd9c5e04505f9362a519a7b366f909947c4065bb744e52f74d2ce0efd090a6e40f66f5712dca42b7fdf0c17e6f30477b3cd412b1fe8a78423d3cedc7c26f6845431aebe522fc15c23509e7215a493471bb9465a86c974a441f51a26cecf90f288364508f04446acfdc537ce7ae628735cf98a6", 0xef}, {&(0x7f00000007c0)="38ee3473d830b415f833eff37f3f4328e38f747664eb1f26b27d55fcda34db443aa4758793aecf9d7a2b74f1ba21890a3e5e350dd89e1ef0c0d9d553487720b4ac27c622cf2d0b41f59bf881d51c87eaea985f7ea2bc069841153b982c0529ad87fcdc869deca66aefbaa5049c62cf52ade33e82a27ef415b9de641ea462825c8b13e80f75c8b48e519709060d2cf536f0f1ea03da441f7fff72", 0x9a}, {&(0x7f0000000880)="b57dda46fc0a74a0d6383f27cb188b649e43cc09d310fcc6106e71e79789092668e6b6333ec216659a3493e899e5db3b414d4306e884d28fc9c763cb053d48683a8543936a7615efe1f2267fa9de61187a2365603ba70225cc0246d8857a2036e4ec5334a72f151f536d9efafc1b721c73db767375282c76b8dc24b2bb8e4ca20d378616e17e3ac27f8a1e526f3d40df6059e842047b643724cb0e628a", 0x9d}, {&(0x7f0000000940)="8d3746d1d7d51ae3fc2f1f93941efead102f254433dd1457c2c7de201324ea", 0x1f}, {&(0x7f0000000980)="2f807fd90d382938b93907533c87050b362325aa99da7ee8165b08cbcc4e7b954a1f0e377e08d730661b6e7a1b3ee45359a948a0399020e22dc8a5c1151e1f9b120c977cf58a86a3c057cab6300d943d33df7b573e6a9af4dba9271393fa1c4825ae25a5c19239c957e0e6c1c99f64fef3880c670092790266bc37d6039fdc3dd18f02c96c121d0312e198a29b4db99a18a539841ec856da", 0x98}], 0x7, &(0x7f0000000ec0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x0, 0x7, "450cd7c011"}, @noop, @lsrr={0x83, 0x7, 0x1, [@broadcast]}, @ssrr={0x89, 0x23, 0x80, [@loopback, @local, @rand_addr=0x2, @multicast1, @multicast1, @local, @local, @broadcast]}, @rr={0x7, 0x7, 0x6, [@multicast2]}, @end]}}}], 0xb8}, 0x801) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000fc0)={0xfffffffb}, 0x4) stat(&(0x7f0000001040)='./file0\x00', &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000001200)=0xe8) fstat(r2, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000012c0)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000013c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001400)={0x0, 0x0}, &(0x7f0000001440)=0xc) stat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001540)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001640)=0xe8) r11 = geteuid() stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000001000)='system.posix_acl_access\x00', &(0x7f0000001740)={{}, {}, [{0x2, 0x0, r4}, {0x2, 0x7, r5}, {0x2, 0x2, r6}, {0x2, 0xee76da610a18900a, r7}, {0x2, 0xa84980df3e61901b, r8}, {0x2, 0x7, r9}, {0x2, 0x3, r10}, {0x2, 0x3, r11}, {0x2, 0x4, r12}], {0x4, 0x5}, [{0x8, 0x2, r13}], {0x10, 0xb}, {0x20, 0x4}}, 0x74, 0x0) r14 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002a40)='/dev/hwrng\x00', 0x8000, 0x0) setsockopt$netrom_NETROM_T1(r14, 0x103, 0x1, &(0x7f0000002a80)=0x80000000, 0x4) r15 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002ac0)='/dev/vcs\x00', 0x0, 0x0) ioctl$BLKROGET(r15, 0x125e, &(0x7f0000002b00)) r16 = accept4(0xffffffffffffffff, &(0x7f0000002c00)=@hci, &(0x7f0000002c80)=0x80, 0x1000) r17 = syz_genetlink_get_family_id$tipc2(&(0x7f0000002d00)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r16, &(0x7f0000002e80)={&(0x7f0000002cc0)={0x10, 0x0, 0x0, 0x900200}, 0xc, &(0x7f0000002e40)={&(0x7f0000002d40)={0xe8, r17, 0x310, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xa0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9, @mcast1, 0x8}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x3f}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) r18 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002ec0)='/dev/vsock\x00', 0x100, 0x0) r19 = syz_open_dev$mouse(&(0x7f0000002f40)='/dev/input/mouse#\x00', 0x6, 0x8000) ioctl$KVM_IOEVENTFD(r18, 0x4040ae79, &(0x7f0000002f80)={0x0, &(0x7f0000002f00), 0x0, r19, 0x1}) [ 303.602197][ T7801] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.722793][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 303.769461][ T8051] Unknown ioctl 1077980793 [ 303.771355][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.806881][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.814417][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.832595][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 303.860416][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.888899][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.896636][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.924968][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 303.978487][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 303.987056][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 303.996836][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.007009][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.016785][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.026378][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.037777][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.046596][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.055913][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 01:02:14 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="cbeb23955869d1736f3f4aad41"], 0x1}}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000640)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @remote}}, 0x1e) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) socket(0x2, 0x1, 0x5) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) [ 304.130097][ T7801] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 304.141914][ T7801] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.151982][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.178748][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.240235][ T7801] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.274749][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 304.283016][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 304.541243][ T2608] device bridge_slave_1 left promiscuous mode [ 304.548465][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.581241][ T2608] device bridge_slave_0 left promiscuous mode [ 304.588115][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:14 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:14 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="cbeb23955869d1736f3f4aad41"], 0x1}}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000640)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @remote}}, 0x1e) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) socket(0x2, 0x1, 0x5) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) 01:02:14 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, r2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r3, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8, 0x101}, @mss, @timestamp, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) getsockopt$inet_tcp_int(r4, 0x6, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 01:02:14 executing program 0: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x7f, 0x9858c19d28cd19be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x5100, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r4 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r5) r6 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r6, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r6, 0x20000003) r7 = accept4(r6, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r7, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={0x0, 0x2}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f00000003c0)={r8, @in6={{0xa, 0x4e24, 0x2, @rand_addr="c0a555ff427fa0a54f69792a217641e2", 0x8}}, 0x7, 0x952a}, 0x90) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000340)={0x3, {0xf832, 0x0, 0x2, 0x4}}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') accept4$ax25(r0, &(0x7f0000000200)={{0x3, @rose}, [@netrom, @bcast, @default, @remote, @null, @null, @null, @default]}, &(0x7f0000000280)=0xfffffffffffffec4, 0x0) socket(0x10, 0x0, 0x8) 01:02:14 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x272feb4fa63ddc6, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007180)=[{{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000001380)=""/7, 0x7}], 0x1}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/fib_triestat\x00') preadv(r4, &(0x7f00000017c0), 0x331, 0x0) 01:02:14 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000000)={0x5a, 0xff, 0xb, 0x9, 0x400, 0x81}) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00\x00z\a!\x00\t\xdc\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x20000003) r4 = accept4(r3, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r5 = socket$caif_stream(0x25, 0x1, 0x3) r6 = socket$xdp(0x2c, 0x3, 0x0) r7 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r7, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r7, 0x20000003) r8 = accept4(r7, 0x0, 0x0, 0x0) recvmmsg(r8, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r8, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) connect$bt_l2cap(r8, &(0x7f0000000240)={0x1f, 0x9, {0x8, 0x1, 0x20, 0x6, 0x7}, 0x1ff, 0x9}, 0xe) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dri/renderD128\x00', 0x2, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r6, &(0x7f0000000900)={0x2c, 0x2, r9}, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00', r9}) sendmsg$can_bcm(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x1d, r9}, 0x10, &(0x7f0000000080)={&(0x7f0000000100)={0x3, 0x200, 0x4, {0x77359400}, {0x0, 0x2710}, {0x3, 0x0, 0x1, 0x1}, 0x1, @canfd={{0x0, 0x1}, 0x40, 0x2, 0x0, 0x0, "0c1cc25a98a9fc8459d597a20136e3f6ef6ed8bd702a8c197af3fb3a2884ddac65de309b011a14fd8c0d0243aed1e57ed62ef5e3f78d6aeae4ff0be5053025fc"}}, 0x80}, 0x1, 0x0, 0x0, 0xa2483e44eb71da18}, 0x80) 01:02:15 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, r2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r3, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8, 0x101}, @mss, @timestamp, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) getsockopt$inet_tcp_int(r4, 0x6, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 01:02:15 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, r2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r3, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8, 0x101}, @mss, @timestamp, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) getsockopt$inet_tcp_int(r4, 0x6, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 01:02:15 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, r2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r3, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8, 0x101}, @mss, @timestamp, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) getsockopt$inet_tcp_int(r4, 0x6, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 01:02:15 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, r2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r3, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8, 0x101}, @mss, @timestamp, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) getsockopt$inet_tcp_int(r4, 0x6, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 01:02:15 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, r2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r3, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8, 0x101}, @mss, @timestamp, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) getsockopt$inet_tcp_int(r4, 0x6, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 01:02:16 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, r2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r3, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8, 0x101}, @mss, @timestamp, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) getsockopt$inet_tcp_int(r4, 0x6, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 306.730991][ T2608] device hsr_slave_0 left promiscuous mode [ 306.780817][ T2608] device hsr_slave_1 left promiscuous mode [ 306.848450][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 306.860752][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 306.874349][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 306.924892][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 307.003813][ T2608] bond0 (unregistering): Released all slaves [ 307.117576][ T8095] bond0: (slave ip_vti0): The slave device specified does not support setting the MAC address [ 307.129240][ T8095] bond0: (slave ip_vti0): Error -95 calling set_mac_address [ 307.141076][ T8109] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.148312][ T8109] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:17 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:17 executing program 1: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, r2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r3, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8, 0x101}, @mss, @timestamp, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) getsockopt$inet_tcp_int(r4, 0x6, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 01:02:17 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) kexec_load(0x0, 0x10, &(0x7f0000000080)=[{0x0}], 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x28812, r1, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000340)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, r2, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r3 = open(0x0, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) dup2(r3, 0xffffffffffffffff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, 0x0, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8, 0x101}, @mss, @timestamp, @sack_perm], 0x5) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x80000000}, 0x14) shutdown(r4, 0x1) getsockopt$inet_tcp_int(r4, 0x6, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 307.201107][ T8119] bond0: (slave ip_vti0): The slave device specified does not support setting the MAC address [ 307.220827][ T8119] bond0: (slave ip_vti0): Error -95 calling set_mac_address [ 307.804342][ T8154] IPVS: ftp: loaded support on port[0] = 21 [ 307.875306][ T8154] chnl_net:caif_netlink_parms(): no params data found [ 307.907164][ T8154] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.915314][ T8154] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.923726][ T8154] device bridge_slave_0 entered promiscuous mode [ 307.932125][ T8154] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.940253][ T8154] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.949416][ T8154] device bridge_slave_1 entered promiscuous mode [ 307.967079][ T8154] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 307.979772][ T8154] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 307.998534][ T8154] team0: Port device team_slave_0 added [ 308.008307][ T8154] team0: Port device team_slave_1 added [ 308.072789][ T8154] device hsr_slave_0 entered promiscuous mode [ 308.111080][ T8154] device hsr_slave_1 entered promiscuous mode [ 308.157734][ T8154] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.165665][ T8154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.173338][ T8154] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.181051][ T8154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.213036][ T8154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.226596][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.235199][ T7895] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.243621][ T7895] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.257683][ T8154] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.267301][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 308.276665][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.286829][ T7895] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.294601][ T7895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.306938][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 308.317246][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.326864][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.334024][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.400016][ T8154] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 308.411077][ T8154] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 308.422875][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 308.432269][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 308.441760][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 308.450331][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 308.458965][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 308.467718][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 308.476871][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 308.485233][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.494099][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 308.502618][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.511198][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 308.519412][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 308.564649][ T8154] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 308.572896][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 308.580349][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 308.772240][ T8164] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 01:02:18 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0xc0080, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x2de, 0x0, 0x0, 0xffffffffffffff5e) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r5, 0x9, r4, 0x2) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f00000000c0)={0x10003, 0x0, &(0x7f0000013000/0x4000)=nil}) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:02:18 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERY_EXT_CTRL(0xffffffffffffffff, 0xc0e85667, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="cbeb23955869d1736f3f4aad41"], 0x1}}, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000640)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) connect$pptp(r1, &(0x7f0000000180)={0x18, 0x2, {0x0, @remote}}, 0x1e) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_capability(0x0, &(0x7f0000000200)='security.capability\x00', 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) socket(0x2, 0x1, 0x5) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) 01:02:18 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:18 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000b40)='oom_adj\x00') openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000b80)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x38, 0xff, 0x4, 0xffffffffffff0000, 0x2, 0x0, 0x400, 0x151, 0x40, 0x30b, 0x0, 0x8de2, 0x38, 0x2, 0x1, 0x20}, [{0x70000005, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x4, 0x4}], "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", [[]]}, 0x1178) r1 = syz_open_procfs(0x0, &(0x7f0000000540)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') sendfile(r1, r0, 0x0, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_subtree(r2, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00"/189], 0x5) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 01:02:18 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:18 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x8000000000000085, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x145142, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r7, 0x9, r6, 0x2) ioctl$SNDRV_PCM_IOCTL_REWIND(r6, 0x40084146, &(0x7f0000000000)=0x7fffffff) ftruncate(r2, 0xee72) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 309.053654][ T8173] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.062401][ T8173] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:19 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00') rename(&(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') kexec_load(0x1, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000240)="cda196ed01bacc7eaf75f3b7da8cbd4bcf5ef80fa3ac654f82dfc21efc96724aa2900e6bc43b689952d03156f387b143be90ce46765865796a22e9d817cfad741f7a33c3e3dd4d4c511b5fa2747550a169007cc7b3ec117ac82176e1c1c5b60d93fd5bc43e9c08d5fef681ebff94692bee9b4335217aa3d2aeb37ff81d3a2ff3b8d5e60898bdd09dfc7d79b3400c63924f01fa2f700a0c3c531e5ed51d41e78b4b2246b727c3b2595eff483fc3e26f2b3dea6bd7d99757d60529a50c6aa425f1541a06c2e17d400a863bd22e5024bad2aa", 0xd1, 0x2, 0x6}, {&(0x7f0000000340)="b221d4a0ef74b2292ea13318beb7af43974fdbeb803e0affed1a9f44d89dd4b0bbeeb390e5f8012454008b504d9d20be07044ceb38500cc17309b2bbaeeddc546f23b7bfc960d5cf7a459b3a1d5e56514ddc3a964d5479baaeb3426e44e82f142573129d874a881d16242fa15894520a2215150027ab231a46f3e294a7a78da71e0a539cc2018946c03425f3b11ffba0050c553aac8d6392ef9a6b9727984d16529b14ba447c09fee2d983eb753988063c23ea8d0870066c7610ab7012cb87f9a3306f3ff24b3edff6a50fe30dc5afcad7b9ff9aad38bec4e2c01b8b6c28ce522d", 0xe1, 0x1, 0x100}, {&(0x7f0000000040)="d03ee2ea8d164993683748287cd82225c360a4ba55a2b9b3236a4a1d4c4522ea263c42df7d8713e31796a92a7b702ecf000ec7d5e1fa408e4117503fa67aa2fabd1ee98475e3ae666d19798430eab067c6e48b7892a277969ce6e202ff52f21eb193375eb1e82773130d30eb5aa6ebb481d53379821c9e819a", 0x79, 0x1000000}, {&(0x7f0000000180)="a1144dfb82b4022dbf172d33e6e3a1be9825d4137192099b5e6833dc", 0x1c, 0x3, 0x6}], 0x190000) link(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000000)='./file0/file0\x00') 01:02:19 executing program 4: r0 = socket(0x10, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002c000705000500"/20, @ANYRES32, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x40000, 0x20200) 01:02:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r2 = accept$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e) sendmsg$sock(r2, &(0x7f0000000640)={&(0x7f0000000480)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x80000000}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)="4ad425989e14b7be3f100fca7359f7e07ac04fd9d494343d4c6e272814ead06b81173b3397a6ba3ccb076fc2a88caf2396a003606a8fd61912a047cfdab565c70eb1cea3b51eaf4d435ee2c686bf1c78157227f66e6c1de2314e5a157361f3e55189438f206c46bf8803e94d21e8a541a6836a5dea2b8cb37ec8b44c6d98ac53fb2067a77876e7917e074d2471ea117b5db99489534de93d94d263e635cb23ed389ae4f5e8cb7305523f5a05a4f4212f3dcdc21895f99d35f08cca80aa88", 0xbe}], 0x1, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x81}}], 0x18}, 0x20010000) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xd59}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r6 = dup(r5) write$FUSE_BMAP(r6, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_ENTRY(r6, &(0x7f0000000140)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x42c) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c77666480d93d", @ANYRESHEX=r5, @ANYBLOB=',\x00']) socket$kcm(0x2, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="71756f74613d6f6e2c6c6f636b70726f746f3d646c6d2c6c6f658c54ec46049f6363"]) acct(&(0x7f0000000680)='./file0\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x2000, 0x0) ioctl$VHOST_SET_OWNER(r8, 0xaf01, 0x0) ioctl$VIDIOC_QUERYCAP(r7, 0x80685600, &(0x7f00000002c0)) [ 309.623282][ T8192] 9pnet: Insufficient options for proto=fd 01:02:19 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xa925, 0x1d, 0x0, 0xffffffffffffffff}) r3 = dup(r2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r3}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1f}, 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x954}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) [ 309.922633][ T8199] 9pnet: Insufficient options for proto=fd 01:02:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r2 = accept$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e) sendmsg$sock(r2, &(0x7f0000000640)={&(0x7f0000000480)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x80000000}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)="4ad425989e14b7be3f100fca7359f7e07ac04fd9d494343d4c6e272814ead06b81173b3397a6ba3ccb076fc2a88caf2396a003606a8fd61912a047cfdab565c70eb1cea3b51eaf4d435ee2c686bf1c78157227f66e6c1de2314e5a157361f3e55189438f206c46bf8803e94d21e8a541a6836a5dea2b8cb37ec8b44c6d98ac53fb2067a77876e7917e074d2471ea117b5db99489534de93d94d263e635cb23ed389ae4f5e8cb7305523f5a05a4f4212f3dcdc21895f99d35f08cca80aa88", 0xbe}], 0x1, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x81}}], 0x18}, 0x20010000) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xd59}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r6 = dup(r5) write$FUSE_BMAP(r6, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_ENTRY(r6, &(0x7f0000000140)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x42c) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c77666480d93d", @ANYRESHEX=r5, @ANYBLOB=',\x00']) socket$kcm(0x2, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="71756f74613d6f6e2c6c6f636b70726f746f3d646c6d2c6c6f658c54ec46049f6363"]) acct(&(0x7f0000000680)='./file0\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x2000, 0x0) ioctl$VHOST_SET_OWNER(r8, 0xaf01, 0x0) ioctl$VIDIOC_QUERYCAP(r7, 0x80685600, &(0x7f00000002c0)) [ 310.264021][ T8210] 9pnet: Insufficient options for proto=fd 01:02:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r2 = accept$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e) sendmsg$sock(r2, &(0x7f0000000640)={&(0x7f0000000480)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x80000000}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)="4ad425989e14b7be3f100fca7359f7e07ac04fd9d494343d4c6e272814ead06b81173b3397a6ba3ccb076fc2a88caf2396a003606a8fd61912a047cfdab565c70eb1cea3b51eaf4d435ee2c686bf1c78157227f66e6c1de2314e5a157361f3e55189438f206c46bf8803e94d21e8a541a6836a5dea2b8cb37ec8b44c6d98ac53fb2067a77876e7917e074d2471ea117b5db99489534de93d94d263e635cb23ed389ae4f5e8cb7305523f5a05a4f4212f3dcdc21895f99d35f08cca80aa88", 0xbe}], 0x1, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x81}}], 0x18}, 0x20010000) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xd59}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r6 = dup(r5) write$FUSE_BMAP(r6, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_ENTRY(r6, &(0x7f0000000140)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x42c) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c77666480d93d", @ANYRESHEX=r5, @ANYBLOB=',\x00']) socket$kcm(0x2, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="71756f74613d6f6e2c6c6f636b70726f746f3d646c6d2c6c6f658c54ec46049f6363"]) acct(&(0x7f0000000680)='./file0\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x2000, 0x0) ioctl$VHOST_SET_OWNER(r8, 0xaf01, 0x0) ioctl$VIDIOC_QUERYCAP(r7, 0x80685600, &(0x7f00000002c0)) [ 310.451265][ T2608] device bridge_slave_1 left promiscuous mode [ 310.467752][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.521363][ T2608] device bridge_slave_0 left promiscuous mode [ 310.535734][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000280)=0x14) dup3(r3, r2, 0x0) ioctl$KDMKTONE(r3, 0x4b30, 0x3a3) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 01:02:20 executing program 4: r0 = socket(0x10, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002c000705000500"/20, @ANYRES32, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x40000, 0x20200) 01:02:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r2 = accept$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e) sendmsg$sock(r2, &(0x7f0000000640)={&(0x7f0000000480)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x80000000}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)="4ad425989e14b7be3f100fca7359f7e07ac04fd9d494343d4c6e272814ead06b81173b3397a6ba3ccb076fc2a88caf2396a003606a8fd61912a047cfdab565c70eb1cea3b51eaf4d435ee2c686bf1c78157227f66e6c1de2314e5a157361f3e55189438f206c46bf8803e94d21e8a541a6836a5dea2b8cb37ec8b44c6d98ac53fb2067a77876e7917e074d2471ea117b5db99489534de93d94d263e635cb23ed389ae4f5e8cb7305523f5a05a4f4212f3dcdc21895f99d35f08cca80aa88", 0xbe}], 0x1, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x81}}], 0x18}, 0x20010000) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xd59}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r6 = dup(r5) write$FUSE_BMAP(r6, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_ENTRY(r6, &(0x7f0000000140)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x42c) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c77666480d93d", @ANYRESHEX=r5, @ANYBLOB=',\x00']) socket$kcm(0x2, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="71756f74613d6f6e2c6c6f636b70726f746f3d646c6d2c6c6f658c54ec46049f6363"]) acct(&(0x7f0000000680)='./file0\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x2000, 0x0) ioctl$VHOST_SET_OWNER(r8, 0xaf01, 0x0) ioctl$VIDIOC_QUERYCAP(r7, 0x80685600, &(0x7f00000002c0)) 01:02:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r2 = accept$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e) sendmsg$sock(r2, &(0x7f0000000640)={&(0x7f0000000480)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x80000000}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)="4ad425989e14b7be3f100fca7359f7e07ac04fd9d494343d4c6e272814ead06b81173b3397a6ba3ccb076fc2a88caf2396a003606a8fd61912a047cfdab565c70eb1cea3b51eaf4d435ee2c686bf1c78157227f66e6c1de2314e5a157361f3e55189438f206c46bf8803e94d21e8a541a6836a5dea2b8cb37ec8b44c6d98ac53fb2067a77876e7917e074d2471ea117b5db99489534de93d94d263e635cb23ed389ae4f5e8cb7305523f5a05a4f4212f3dcdc21895f99d35f08cca80aa88", 0xbe}], 0x1, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x81}}], 0x18}, 0x20010000) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xd59}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r6 = dup(r5) write$FUSE_BMAP(r6, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_ENTRY(r6, &(0x7f0000000140)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x42c) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c77666480d93d", @ANYRESHEX=r5, @ANYBLOB=',\x00']) socket$kcm(0x2, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="71756f74613d6f6e2c6c6f636b70726f746f3d646c6d2c6c6f658c54ec46049f6363"]) acct(&(0x7f0000000680)='./file0\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x2000, 0x0) ioctl$VHOST_SET_OWNER(r8, 0xaf01, 0x0) ioctl$VIDIOC_QUERYCAP(r7, 0x80685600, &(0x7f00000002c0)) [ 312.020817][ T2608] device hsr_slave_0 left promiscuous mode [ 312.063577][ T2608] device hsr_slave_1 left promiscuous mode [ 312.110441][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 312.125075][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 312.136200][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 312.187981][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 312.272572][ T2608] bond0 (unregistering): Released all slaves [ 312.488898][ T8233] IPVS: ftp: loaded support on port[0] = 21 [ 312.826423][ T8233] chnl_net:caif_netlink_parms(): no params data found [ 312.942928][ T8233] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.950042][ T8233] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.981841][ T8233] device bridge_slave_0 entered promiscuous mode [ 313.014114][ T8233] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.033113][ T8233] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.062050][ T8233] device bridge_slave_1 entered promiscuous mode [ 313.106507][ T8259] IPVS: ftp: loaded support on port[0] = 21 [ 313.134074][ T8233] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.175416][ T8233] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.254216][ T8233] team0: Port device team_slave_0 added [ 313.296223][ T8233] team0: Port device team_slave_1 added [ 313.423771][ T8233] device hsr_slave_0 entered promiscuous mode [ 313.470981][ T8233] device hsr_slave_1 entered promiscuous mode [ 313.493015][ T8233] debugfs: Directory 'hsr0' with parent '/' already present! [ 313.576191][ T8259] chnl_net:caif_netlink_parms(): no params data found [ 313.711363][ T8233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.718453][ T8259] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.743918][ T8259] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.784799][ T8259] device bridge_slave_0 entered promiscuous mode [ 313.828976][ T8259] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.860747][ T8259] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.868663][ T8259] device bridge_slave_1 entered promiscuous mode [ 313.929693][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 313.938301][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.966590][ T8233] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.988333][ T8262] IPVS: ftp: loaded support on port[0] = 21 [ 314.011427][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 314.026334][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.044961][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.052089][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.093931][ T8259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.111119][ T8259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.128939][ T8233] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 314.142998][ T8233] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 314.156984][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 314.168203][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 314.178147][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.191813][ T7895] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.198959][ T7895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.209810][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 314.219199][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 314.228487][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 314.237307][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 314.246159][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 314.255053][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 314.264200][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 314.273294][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.282149][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.290614][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.309640][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 314.317724][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.345351][ T8259] team0: Port device team_slave_0 added [ 314.352999][ T8259] team0: Port device team_slave_1 added [ 314.423297][ T8259] device hsr_slave_0 entered promiscuous mode [ 314.471156][ T8259] device hsr_slave_1 entered promiscuous mode [ 314.510768][ T8259] debugfs: Directory 'hsr0' with parent '/' already present! [ 314.524626][ T8233] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.535960][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.543916][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.576211][ T8262] chnl_net:caif_netlink_parms(): no params data found [ 314.603853][ T8262] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.611172][ T8262] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.619057][ T8262] device bridge_slave_0 entered promiscuous mode [ 314.627146][ T8262] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.635351][ T8262] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.643493][ T8262] device bridge_slave_1 entered promiscuous mode [ 314.665085][ T8262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.682572][ T8262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.702670][ T8262] team0: Port device team_slave_0 added [ 314.709924][ T8262] team0: Port device team_slave_1 added [ 314.757778][ T8259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.793338][ T8262] device hsr_slave_0 entered promiscuous mode [ 314.831682][ T8262] device hsr_slave_1 entered promiscuous mode [ 314.870671][ T8262] debugfs: Directory 'hsr0' with parent '/' already present! [ 314.882366][ T8276] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.890773][ T8276] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:25 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r2 = accept$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e) sendmsg$sock(r2, &(0x7f0000000640)={&(0x7f0000000480)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x80000000}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)="4ad425989e14b7be3f100fca7359f7e07ac04fd9d494343d4c6e272814ead06b81173b3397a6ba3ccb076fc2a88caf2396a003606a8fd61912a047cfdab565c70eb1cea3b51eaf4d435ee2c686bf1c78157227f66e6c1de2314e5a157361f3e55189438f206c46bf8803e94d21e8a541a6836a5dea2b8cb37ec8b44c6d98ac53fb2067a77876e7917e074d2471ea117b5db99489534de93d94d263e635cb23ed389ae4f5e8cb7305523f5a05a4f4212f3dcdc21895f99d35f08cca80aa88", 0xbe}], 0x1, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x81}}], 0x18}, 0x20010000) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xd59}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r6 = dup(r5) write$FUSE_BMAP(r6, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_ENTRY(r6, &(0x7f0000000140)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x42c) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c77666480d93d", @ANYRESHEX=r5, @ANYBLOB=',\x00']) socket$kcm(0x2, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="71756f74613d6f6e2c6c6f636b70726f746f3d646c6d2c6c6f658c54ec46049f6363"]) acct(&(0x7f0000000680)='./file0\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x2000, 0x0) ioctl$VHOST_SET_OWNER(r8, 0xaf01, 0x0) ioctl$VIDIOC_QUERYCAP(r7, 0x80685600, &(0x7f00000002c0)) 01:02:25 executing program 4: r0 = socket(0x10, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000002c000705000500"/20, @ANYRES32, @ANYBLOB="00000400f1ffffff0000000008000100687462001c000200180002000300000000010000000000000800000000000000ce204b707596906260a7cefc"], 0x48}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x40000, 0x20200) 01:02:25 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r1, 0x200004) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000280)=0x14) dup3(r3, r2, 0x0) ioctl$KDMKTONE(r3, 0x4b30, 0x3a3) sendfile(r0, r1, 0x0, 0x80001d00c0d0) [ 315.293459][ T8281] 9pnet: Insufficient options for proto=fd [ 315.316911][ T8259] 8021q: adding VLAN 0 to HW filter on device team0 01:02:25 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7bf63282530360d2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = open(&(0x7f0000000040)='./bus\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xfffffffffffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x0) sendfile(r1, r3, 0x0, 0x80001d0080d1) [ 315.362931][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 315.391190][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:02:25 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x22}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$radio(0x0, 0x3, 0x2) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r3) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xedab5b6aaf47d650, &(0x7f0000000340)="c07a4450693fadada0722fa8cfae47e6d736db1c89f019093a17b8f322e26beba79561a3ef5c529be8dbd8e57d9a04db62eb6d6c7eba8f10f1383f68366a0644c9ca54940679992faecc7dc2f16a7dbc284d25ea352240d4bcf8341bb54a83090e880d8c4ca6b6dc7d821899971a71425610215f51816d00948f5a2590035a2a171f1802898365a194d6537af723aa0d72e8df0e24e4f52d2c469f98d5b1", 0x9e) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r5, 0x9, r4, 0x2) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) write$UHID_CREATE(r2, &(0x7f00000001c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x0, 0x6, 0x7b5, 0x4, 0x0, 0x7}, 0x120) fsetxattr(r1, 0x0, &(0x7f0000000300)='/dev/radio#\x00', 0xc, 0x1) r6 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x0) r7 = syz_open_dev$mice(&(0x7f0000000240)='inpu[\x00\x00%\x17\x82\x00', 0x0, 0xc80) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000040), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r8, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r8, &(0x7f00000012c0)="20265c927f1f6588b967481241ba7860f46ef65ac610ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) sendto$inet(r2, &(0x7f0000000500)="6bb3c52c9f9ee86fb44dd6dc311a5ce87cceec4f44bc92332c8e5679eeb388043617f453f635c27f182a94970cc816601581123226410da19532680e6ad975e371655576ffebf328cd76a9c74309e2176ea6423d50a60a3570442636ed0058f5e9afb28dfa55c5b3bf9091f842b933f3613d71781d57e1462f0c5641acb96de4349e3708260d50da9d9ccbc1b5f1f59e3bdec5e142749b2c31e63feeb49e2a114fb909cadb96aa29074a52c25fc0685ecc2e8d00c4eb701e047e579ce810259a431180db51a0062f958971f4dda1be03019c7c4fbe7addc43f", 0xd9, 0x4000008, 0x0, 0x0) 01:02:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x20000003) r3 = syz_open_dev$vcsn(&(0x7f0000000740)='/dev/vcs#\x00', 0x6, 0x80000) r4 = accept4(r3, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) sendmsg$kcm(r4, &(0x7f0000000180)={&(0x7f00000000c0)=@caif=@dbg={0x25, 0x7, 0x3b}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000280)="983309d2a9801fee6cf1422aac00c3658b6e381dc0cd2cdb036ced904e83d7f084d15ab0c820653040b2452b1818f07089a3ec888fc87efed0fa87625df05b280acba0b5d78b0306f31d1b4a223f01f7dc9d3bfa091a7e13c9fcc374be3ed84021c909f2bc53ea423c66a2f21c3e32b0fb33fd96ccaad4843d76aba288557b1d9afdd339f3f7cf90dc8dfaa168c9c44b796cbb6ed0f32a38bb5e13eec1bf4ef109b2ee748e49fbb7dd0bd4d5660bbe275d20527a523457d9328a70ab18d928d9ced9a3af8f901160da5a247aa417cfede076162cb3e441d5d8b57e485b46b395b4735d40e601e3a78484ff4c00aa1d190280", 0xf2}, {&(0x7f0000000380)="3a7199a153270dcdbabda852a90c9fa9477f00b3d38f2253f6e5444a0ea9b9fe616808cc94d93aa8e192da24997f03adbf7d64eef6ae98369660f40af0721bf0ae6942fa1ad0f9ed4918287b8c072995ca53b08edf0793a4d6640da8a781c9bd3549b8e805b3c41968dad2751896d61549445361fffd04ac2e4f790d3f8c29696b1db35023739ebd6f3006d6a54d5dd7db013526839ddff5ae553e0b5f915f564910aac86c020845fecb94beb0bfc16ea07abc4084323594860fc263180f724aec50424820d8be796fc7ecaa26b32110e0d9cbe840bd20ae524e4a376ad55cf8fd37777f69", 0xe5}, {&(0x7f0000000480)="b6aae6548d258dffdb13a3c8426aaa33c1ff6c54c93dd0433b5a2abe8f46925f0c1fd19bf22bf4d2228e92f3942cdb1295ef5a70a30578cc947de5a6d53b4625edc282c13151196f7609fe9500afe12db09efb6dc4aeb49d9ba59fe445bd434cbeb9de57121207088b97be155a269e04358e39fbf0530f4c21645f71f05219b7ccc9fc41b27a2b4adc24", 0x8a}, {&(0x7f0000000140)="2f60c5ddce6541ae3557a4412547c04e8f4b88841fd44b67f0544ace9b5e65964f8cb6aedfbaaac22ddc", 0x2a}, {&(0x7f0000000540)="d22fade6fad051d66009ab1468ea5a5003c8e3b7254847f6a832f9aac9dbedb343b803f9f0746dc7308c6c0acbc6342e8da8ea13f4fcab1fc21fa7bc7fcbe465164194e34576296fe9470ba3c953c88e13057a0b68044f0223530ffcf6812914cf01dc312b6a81b2081e433dcb193ef237369364ac9d1d347cf1ee6d7d2929fcc01c644044b43a6ebd3414539408ddf55740cb50df5ef5dba3f9d85d04feb04be2b314480a27e146536fcb0594b680432924e491beed69d7bb5e7e40f7417a2539113c68f458c1dde1e2088ffc56cb2218330013a50f9c11130b", 0xda}], 0x5, &(0x7f00000006c0)=[{0x68, 0x10f, 0x2, "b8f2ffc0b2e21621a5133d6ee6c5e2e9792ac5be83e003b311967835903cd5cfd65b47b1ecc3a6790668b137408ad0345f7f088b75d19d341238087ca8d18d23196bc0c9d0bf131f401543b608a61fc4e6d47019967336"}, {0x18, 0x0, 0x8b08, "945acc198c"}], 0x80}, 0xc008004) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)) r5 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x2, 0x10) ioctl$VIDIOC_STREAMOFF(r5, 0x40045613, &(0x7f0000000040)=0x8) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r7, 0x9, r6, 0x2) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000780)=0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 316.009741][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.049016][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.086071][ T7773] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.093776][ T7773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 316.161359][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.170153][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.231218][ T7773] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.238552][ T7773] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.252245][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 316.271458][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 01:02:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x20000003) r3 = syz_open_dev$vcsn(&(0x7f0000000740)='/dev/vcs#\x00', 0x6, 0x80000) r4 = accept4(r3, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r4, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) sendmsg$kcm(r4, &(0x7f0000000180)={&(0x7f00000000c0)=@caif=@dbg={0x25, 0x7, 0x3b}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000280)="983309d2a9801fee6cf1422aac00c3658b6e381dc0cd2cdb036ced904e83d7f084d15ab0c820653040b2452b1818f07089a3ec888fc87efed0fa87625df05b280acba0b5d78b0306f31d1b4a223f01f7dc9d3bfa091a7e13c9fcc374be3ed84021c909f2bc53ea423c66a2f21c3e32b0fb33fd96ccaad4843d76aba288557b1d9afdd339f3f7cf90dc8dfaa168c9c44b796cbb6ed0f32a38bb5e13eec1bf4ef109b2ee748e49fbb7dd0bd4d5660bbe275d20527a523457d9328a70ab18d928d9ced9a3af8f901160da5a247aa417cfede076162cb3e441d5d8b57e485b46b395b4735d40e601e3a78484ff4c00aa1d190280", 0xf2}, {&(0x7f0000000380)="3a7199a153270dcdbabda852a90c9fa9477f00b3d38f2253f6e5444a0ea9b9fe616808cc94d93aa8e192da24997f03adbf7d64eef6ae98369660f40af0721bf0ae6942fa1ad0f9ed4918287b8c072995ca53b08edf0793a4d6640da8a781c9bd3549b8e805b3c41968dad2751896d61549445361fffd04ac2e4f790d3f8c29696b1db35023739ebd6f3006d6a54d5dd7db013526839ddff5ae553e0b5f915f564910aac86c020845fecb94beb0bfc16ea07abc4084323594860fc263180f724aec50424820d8be796fc7ecaa26b32110e0d9cbe840bd20ae524e4a376ad55cf8fd37777f69", 0xe5}, {&(0x7f0000000480)="b6aae6548d258dffdb13a3c8426aaa33c1ff6c54c93dd0433b5a2abe8f46925f0c1fd19bf22bf4d2228e92f3942cdb1295ef5a70a30578cc947de5a6d53b4625edc282c13151196f7609fe9500afe12db09efb6dc4aeb49d9ba59fe445bd434cbeb9de57121207088b97be155a269e04358e39fbf0530f4c21645f71f05219b7ccc9fc41b27a2b4adc24", 0x8a}, {&(0x7f0000000140)="2f60c5ddce6541ae3557a4412547c04e8f4b88841fd44b67f0544ace9b5e65964f8cb6aedfbaaac22ddc", 0x2a}, {&(0x7f0000000540)="d22fade6fad051d66009ab1468ea5a5003c8e3b7254847f6a832f9aac9dbedb343b803f9f0746dc7308c6c0acbc6342e8da8ea13f4fcab1fc21fa7bc7fcbe465164194e34576296fe9470ba3c953c88e13057a0b68044f0223530ffcf6812914cf01dc312b6a81b2081e433dcb193ef237369364ac9d1d347cf1ee6d7d2929fcc01c644044b43a6ebd3414539408ddf55740cb50df5ef5dba3f9d85d04feb04be2b314480a27e146536fcb0594b680432924e491beed69d7bb5e7e40f7417a2539113c68f458c1dde1e2088ffc56cb2218330013a50f9c11130b", 0xda}], 0x5, &(0x7f00000006c0)=[{0x68, 0x10f, 0x2, "b8f2ffc0b2e21621a5133d6ee6c5e2e9792ac5be83e003b311967835903cd5cfd65b47b1ecc3a6790668b137408ad0345f7f088b75d19d341238087ca8d18d23196bc0c9d0bf131f401543b608a61fc4e6d47019967336"}, {0x18, 0x0, 0x8b08, "945acc198c"}], 0x80}, 0xc008004) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)) r5 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x2, 0x10) ioctl$VIDIOC_STREAMOFF(r5, 0x40045613, &(0x7f0000000040)=0x8) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r7, 0x9, r6, 0x2) ioctl$BLKFRASET(r6, 0x1264, &(0x7f0000000780)=0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 316.308599][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 316.380079][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 316.412145][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 316.432493][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 316.451202][ T8299] device nr0 entered promiscuous mode 01:02:26 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) socket$inet6(0xa, 0x803, 0x3) [ 316.509732][ T8262] 8021q: adding VLAN 0 to HW filter on device bond0 01:02:26 executing program 3: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x22}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$radio(0x0, 0x3, 0x2) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r3) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xedab5b6aaf47d650, &(0x7f0000000340)="c07a4450693fadada0722fa8cfae47e6d736db1c89f019093a17b8f322e26beba79561a3ef5c529be8dbd8e57d9a04db62eb6d6c7eba8f10f1383f68366a0644c9ca54940679992faecc7dc2f16a7dbc284d25ea352240d4bcf8341bb54a83090e880d8c4ca6b6dc7d821899971a71425610215f51816d00948f5a2590035a2a171f1802898365a194d6537af723aa0d72e8df0e24e4f52d2c469f98d5b1", 0x9e) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r5, 0x9, r4, 0x2) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) write$UHID_CREATE(r2, &(0x7f00000001c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x0, 0x6, 0x7b5, 0x4, 0x0, 0x7}, 0x120) fsetxattr(r1, 0x0, &(0x7f0000000300)='/dev/radio#\x00', 0xc, 0x1) r6 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x0) r7 = syz_open_dev$mice(&(0x7f0000000240)='inpu[\x00\x00%\x17\x82\x00', 0x0, 0xc80) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000040), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r8, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r8, &(0x7f00000012c0)="20265c927f1f6588b967481241ba7860f46ef65ac610ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) sendto$inet(r2, &(0x7f0000000500)="6bb3c52c9f9ee86fb44dd6dc311a5ce87cceec4f44bc92332c8e5679eeb388043617f453f635c27f182a94970cc816601581123226410da19532680e6ad975e371655576ffebf328cd76a9c74309e2176ea6423d50a60a3570442636ed0058f5e9afb28dfa55c5b3bf9091f842b933f3613d71781d57e1462f0c5641acb96de4349e3708260d50da9d9ccbc1b5f1f59e3bdec5e142749b2c31e63feeb49e2a114fb909cadb96aa29074a52c25fc0685ecc2e8d00c4eb701e047e579ce810259a431180db51a0062f958971f4dda1be03019c7c4fbe7addc43f", 0xd9, 0x4000008, 0x0, 0x0) [ 316.944940][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 316.956125][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 316.979230][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 316.995577][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.008109][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 317.018898][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.031546][ T8259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 317.127080][ T8262] 8021q: adding VLAN 0 to HW filter on device team0 [ 317.141024][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 317.150417][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.213841][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.224223][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.233215][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.240517][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.248484][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.257406][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.266011][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.273378][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.288789][ T8259] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.301340][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 317.309765][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 317.318448][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 317.327854][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 317.337935][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 317.349945][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 317.361844][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 317.372306][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 317.445984][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 317.456638][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 317.475630][ T8262] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 317.492229][ T8262] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 317.586368][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 317.595632][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.606419][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 317.616006][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.681298][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 317.691858][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 317.700881][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 317.714985][ T8262] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.819810][ T8346] 9pnet: Insufficient options for proto=fd [ 317.881733][ T2608] device bridge_slave_1 left promiscuous mode [ 317.889550][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.931551][ T2608] device bridge_slave_0 left promiscuous mode [ 317.948451][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.015451][ T2608] device bridge_slave_1 left promiscuous mode [ 318.032012][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.079392][ T8358] 9pnet: Insufficient options for proto=fd [ 318.091635][ T2608] device bridge_slave_0 left promiscuous mode [ 318.099103][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:28 executing program 0: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setresuid(0x0, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f00000004c0)={0x2, 0xa3, 0x4, {0x8, @win={{0x200, 0x0, 0xfffffffa, 0x2b80}, 0xc, 0x9, 0x0, 0xfffffffa, &(0x7f0000000080)="222b41e1476e94d422352eca0a5ccdfa22349313300cc4b6904c91f37783fa0b90a82a029a85a43c31aa", 0x3}}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000c40)={{{@in6, @in6=@empty}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xffffffbf) getegid() r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000240)) lstat(0x0, &(0x7f0000000b00)) lstat(0x0, &(0x7f00000017c0)) r8 = socket$inet6(0xa, 0x1, 0x0) fstat(r8, &(0x7f00000002c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet6(0xa, 0x1, 0x0) fstat(r9, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, 0x0, r10, 0x81, 0x7}}}, 0x78) fchown(0xffffffffffffffff, 0x0, r10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r12, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRESOCT=r12, @ANYPTR64=&(0x7f0000000fc0)=ANY=[@ANYRESDEC, @ANYBLOB="561355915c2a7d09b273f7e16c818fa52b07effb91dc1f1c01c4d61f20ef9b1081380733981586fc1a0edd48e33a559ad5a29ddcd6075855dc63aec3415a45702de0e810918e0b27c75f02545695500247441a952d5de7cd60701ff9c72e8a4a09c706eb67a8cda0788c1dbe31a30aa7b317decbf266072a0c44294da90e9074318217297cded37842f1bf77c8542f81ca14914a29f411e78e6d9d0ebdac6ca5625b9f8d5ca103ab978a064533431af04e4543f91ff77705ea638cbac5e38cf53fc9e8dc33e88946f404841c04739d93185532b3fce5793d0543377bd007000000998f6f807e82800984ab6fbb9d4fe983186a264f434d00f4429ff35f9c747c888ddefbfca61b6a6163329395820ca68a09225fa124731423a16cab3dbd7dbbcf5a64d6b0207a9fe1ea8a2408d10efe81437e8ed8fce793532cd964b237fdeb02dc9c752c54c1c1c7fd0a473f2b99e7ae1034c7633b16e751329f46c0a8aee23b111525c60d43c729f9557300f76d0b01dbd0d977ad14b390e74ae90859d3c78d0b1135b414855fc9f0b7361520b5848a82042ee08718504f91840b01a29dfcb2641adbfdf29752581b490c4009bbf67b54a7669de5ac86e56f35aef0bae0198b00"/459, @ANYBLOB="613346905fb3ca02ea4a1f0e00761aaf7bd8354e5d47b94be0418d0e5ad6ad0f073f5a6f072dcfb6cf81"], @ANYRES32=r11, @ANYBLOB="2a2c55000000000004f194a40b00000006e96fb822db3db7715320f2e2f6be6a04bb20c2e3e4bed94d42e7142340bac971ebc0ec39328f979e5ce48b08a298f21b9992a1199edd8a8bcae30113d4050fc56f7285e8a51ab07a4272274b26eeece5e7b16fbb28496e4d5733d5b538b0da22a024fe8ac51af50248795609d2"], 0x5, 0x0) geteuid() creat(0x0, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80}, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) write$binfmt_script(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) 01:02:28 executing program 2: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x22}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$radio(0x0, 0x3, 0x2) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r3) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xedab5b6aaf47d650, &(0x7f0000000340)="c07a4450693fadada0722fa8cfae47e6d736db1c89f019093a17b8f322e26beba79561a3ef5c529be8dbd8e57d9a04db62eb6d6c7eba8f10f1383f68366a0644c9ca54940679992faecc7dc2f16a7dbc284d25ea352240d4bcf8341bb54a83090e880d8c4ca6b6dc7d821899971a71425610215f51816d00948f5a2590035a2a171f1802898365a194d6537af723aa0d72e8df0e24e4f52d2c469f98d5b1", 0x9e) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r5, 0x9, r4, 0x2) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) write$UHID_CREATE(r2, &(0x7f00000001c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x0, 0x6, 0x7b5, 0x4, 0x0, 0x7}, 0x120) fsetxattr(r1, 0x0, &(0x7f0000000300)='/dev/radio#\x00', 0xc, 0x1) r6 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x0) r7 = syz_open_dev$mice(&(0x7f0000000240)='inpu[\x00\x00%\x17\x82\x00', 0x0, 0xc80) ioctl$LOOP_SET_FD(r6, 0x4c00, r7) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000040), 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r8, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r8, 0x6, 0xd, 0x0, 0x0) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r8, &(0x7f00000012c0)="20265c927f1f6588b967481241ba7860f46ef65ac610ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) sendto$inet(r2, &(0x7f0000000500)="6bb3c52c9f9ee86fb44dd6dc311a5ce87cceec4f44bc92332c8e5679eeb388043617f453f635c27f182a94970cc816601581123226410da19532680e6ad975e371655576ffebf328cd76a9c74309e2176ea6423d50a60a3570442636ed0058f5e9afb28dfa55c5b3bf9091f842b933f3613d71781d57e1462f0c5641acb96de4349e3708260d50da9d9ccbc1b5f1f59e3bdec5e142749b2c31e63feeb49e2a114fb909cadb96aa29074a52c25fc0685ecc2e8d00c4eb701e047e579ce810259a431180db51a0062f958971f4dda1be03019c7c4fbe7addc43f", 0xd9, 0x4000008, 0x0, 0x0) 01:02:28 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) socket$inet6(0xa, 0x803, 0x3) 01:02:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a111fde54fe46b904832c8fff73", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x17) read(r1, &(0x7f0000000380)=""/225, 0xfffffd0d) r2 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000480)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b8, 0x130, 0x130, 0x240, 0x240, 0x420, 0x560, 0x560, 0x560, 0x560, 0x560, 0x6, 0x0, {[{{@ipv6={@ipv4={[], [], @empty}, @empty, [], [], 'veth0_to_hsr\x00', 'irlan0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "872f204bbacc2b52435065260a88fb2d33377f68f9d9764f57cf98b928fb"}}}, {{@uncond, 0x0, 0xc8, 0x110}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@empty, @ipv6=@dev}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00'}}, {{@uncond, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00'}}, {{@ipv6={@empty, @rand_addr="f71a3efe3c5dfcf958bfa6b4d2cc3e49", [], [], 'yam0\x00', 'veth0\x00'}, 0x0, 0xc8, 0xf0}, @HL={0x28, 'HL\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x618) 01:02:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newlink={0xa8, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x88, 0x12, @erspan={{0xc, 0x1, 'erspan\x00'}, {0x78, 0x2, [@IFLA_GRE_LOCAL={0x8, 0x6, @remote}, @IFLA_GRE_LOCAL={0x8, 0x6, @empty}, @IFLA_GRE_LOCAL={0x8, 0x6, @broadcast}, @IFLA_GRE_LOCAL={0x8, 0x6, @rand_addr=0x5}, @gre_common_policy=[@IFLA_GRE_IGNORE_DF={0x8}, @IFLA_GRE_PMTUDISC={0x8}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x7a918}, @IFLA_GRE_TTL={0x8, 0x8, 0x42}], @IFLA_GRE_REMOTE={0x8, 0x7, @broadcast}, @gre_common_policy=[@IFLA_GRE_ENCAP_FLAGS={0x8, 0xf, 0x2}, @IFLA_GRE_IFLAGS={0x8, 0x2, 0x1000}, @IFLA_GRE_COLLECT_METADATA={0x4}], @IFLA_GRE_REMOTE={0x8, 0x7, @local}, @IFLA_GRE_LOCAL={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0xf}}, @IFLA_GRE_REMOTE={0x8, 0x7, @loopback}]}}}]}, 0xa8}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32=r5, @ANYBLOB="00000000ffffffff0000000008000100736662002c000200280001000000000000000000000000000000000000000000000000000000000000004f0000000000"], 0x58}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="000000000000000003000cf908000100753332000c0002000800f1040100da807c75a0e4a0783d2146ef37fc5740d69e8f8aab6ab4"], 0x3}}, 0x0) connect$packet(r1, &(0x7f0000000180)={0x11, 0x7, r5, 0x1, 0x1, 0x6, @broadcast}, 0x14) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socket$inet6(0xa, 0x3, 0xff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f00009b9000)=ANY=[@ANYBLOB="80"], 0x10}}, 0x0) socket$key(0xf, 0x3, 0x2) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x60}}, 0x0) sendmsg$key(r9, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0xc40c94d75fb102d0, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000001c0), 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') set_tid_address(&(0x7f0000000300)) 01:02:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000003) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r1, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) r2 = accept$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000440)=0x6e) sendmsg$sock(r2, &(0x7f0000000640)={&(0x7f0000000480)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x80000000}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000500)="4ad425989e14b7be3f100fca7359f7e07ac04fd9d494343d4c6e272814ead06b81173b3397a6ba3ccb076fc2a88caf2396a003606a8fd61912a047cfdab565c70eb1cea3b51eaf4d435ee2c686bf1c78157227f66e6c1de2314e5a157361f3e55189438f206c46bf8803e94d21e8a541a6836a5dea2b8cb37ec8b44c6d98ac53fb2067a77876e7917e074d2471ea117b5db99489534de93d94d263e635cb23ed389ae4f5e8cb7305523f5a05a4f4212f3dcdc21895f99d35f08cca80aa88", 0xbe}], 0x1, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x81}}], 0x18}, 0x20010000) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0xd59}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="1300000036ffff018000000600395032303030"], 0x13) r6 = dup(r5) write$FUSE_BMAP(r6, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_ENTRY(r6, &(0x7f0000000140)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x42c) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c77666480d93d", @ANYRESHEX=r5, @ANYBLOB=',\x00']) socket$kcm(0x2, 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$gfs2(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="71756f74613d6f6e2c6c6f636b70726f746f3d646c6d2c6c6f658c54ec46049f6363"]) acct(&(0x7f0000000680)='./file0\x00') r7 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x2000, 0x0) ioctl$VHOST_SET_OWNER(r8, 0xaf01, 0x0) ioctl$VIDIOC_QUERYCAP(r7, 0x80685600, &(0x7f00000002c0)) [ 318.558736][ T8372] 9pnet: Insufficient options for proto=fd 01:02:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES16=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000240)={0x3, "d385d39283e80094e66361a34a5100343aea867e30fd3657f19da0824b4a72bc", 0x3, 0xef5, 0xff, 0xb000, 0x8}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 01:02:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000240)='C/\xafP\x00', &(0x7f00000002c0)='./file0\x00', 0x800400000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000300)="eb3c906d6b66732e66617400020401000200025afff8bfadfb331842471466398a28e156a182b781671096b4cc49e6f555adf3eff3a9ebd85d07f1130a35b76510809e4bb5dafa1e3bfa44", 0x4b}], 0x2021018, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x1, &(0x7f0000000180)=[{&(0x7f00000000c0)="6a37ba1701eb1353bd9edb065b75ca96", 0x10, 0x2}], 0x20000, &(0x7f00000001c0)='\x00') r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x3, 0x0, 0x9}) 01:02:29 executing program 1: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x1, 0x61, 0x10, 0x18}, [@alu={0x0, 0x1, 0x8, 0xc, 0x49ffe0dcb0f336a, 0x30, 0x1}]}, &(0x7f0000003ff6)='\x00\x00', 0x5, 0xc3, &(0x7f0000000080)=""/195, 0x41100, 0x9, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180), 0x33f, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x20}, 0x10}, 0x65) 01:02:29 executing program 2: syz_open_dev$sndctrl(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000300)='lo!bdeveth0^mime_type\x00'}, 0x30) keyctl$chown(0x12, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, r2) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {0x8, 0x1}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400000, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) r6 = socket$xdp(0x2c, 0x3, 0x0) dup3(r6, r5, 0x0) r7 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x561032acc0386146, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r8, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r9, &(0x7f0000000340)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000700)={r9, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x9f15}, &(0x7f0000000300)=0x8) r11 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r12, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r11, 0x84, 0x1f, &(0x7f0000000700)={r13, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f00000003c0)={r10, 0x7fffffff, 0x8, 0xbd, 0x3f, 0x2, 0x3f, 0x1, {r13, @in6={{0xa, 0x4e22, 0x5, @empty, 0x6}}, 0x80000000, 0x0, 0x9, 0xd11}}, &(0x7f0000000480)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r13, @in6={{0xa, 0x4e24, 0xd55, @dev={0xfe, 0x80, [], 0x14}, 0x7fffffff}}, 0x5, 0xd7}, 0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000440)={r13, 0x4, 0x7ff}, 0x8) setregid(0x0, 0x0) 01:02:29 executing program 0: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setresuid(0x0, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f00000004c0)={0x2, 0xa3, 0x4, {0x8, @win={{0x200, 0x0, 0xfffffffa, 0x2b80}, 0xc, 0x9, 0x0, 0xfffffffa, &(0x7f0000000080)="222b41e1476e94d422352eca0a5ccdfa22349313300cc4b6904c91f37783fa0b90a82a029a85a43c31aa", 0x3}}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000c40)={{{@in6, @in6=@empty}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xffffffbf) getegid() r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000240)) lstat(0x0, &(0x7f0000000b00)) lstat(0x0, &(0x7f00000017c0)) r8 = socket$inet6(0xa, 0x1, 0x0) fstat(r8, &(0x7f00000002c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet6(0xa, 0x1, 0x0) fstat(r9, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, 0x0, r10, 0x81, 0x7}}}, 0x78) fchown(0xffffffffffffffff, 0x0, r10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r12, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRESOCT=r12, @ANYPTR64=&(0x7f0000000fc0)=ANY=[@ANYRESDEC, @ANYBLOB="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"/459, @ANYBLOB="613346905fb3ca02ea4a1f0e00761aaf7bd8354e5d47b94be0418d0e5ad6ad0f073f5a6f072dcfb6cf81"], @ANYRES32=r11, @ANYBLOB="2a2c55000000000004f194a40b00000006e96fb822db3db7715320f2e2f6be6a04bb20c2e3e4bed94d42e7142340bac971ebc0ec39328f979e5ce48b08a298f21b9992a1199edd8a8bcae30113d4050fc56f7285e8a51ab07a4272274b26eeece5e7b16fbb28496e4d5733d5b538b0da22a024fe8ac51af50248795609d2"], 0x5, 0x0) geteuid() creat(0x0, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80}, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) write$binfmt_script(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) [ 319.898504][ T8420] overlayfs: workdir and upperdir must reside under the same mount 01:02:30 executing program 2: syz_open_dev$sndctrl(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000300)='lo!bdeveth0^mime_type\x00'}, 0x30) keyctl$chown(0x12, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, r2) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {0x8, 0x1}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400000, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) r6 = socket$xdp(0x2c, 0x3, 0x0) dup3(r6, r5, 0x0) r7 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x561032acc0386146, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r8, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r9, &(0x7f0000000340)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000700)={r9, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x9f15}, &(0x7f0000000300)=0x8) r11 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r12, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r11, 0x84, 0x1f, &(0x7f0000000700)={r13, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f00000003c0)={r10, 0x7fffffff, 0x8, 0xbd, 0x3f, 0x2, 0x3f, 0x1, {r13, @in6={{0xa, 0x4e22, 0x5, @empty, 0x6}}, 0x80000000, 0x0, 0x9, 0xd11}}, &(0x7f0000000480)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r13, @in6={{0xa, 0x4e24, 0xd55, @dev={0xfe, 0x80, [], 0x14}, 0x7fffffff}}, 0x5, 0xd7}, 0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000440)={r13, 0x4, 0x7ff}, 0x8) setregid(0x0, 0x0) 01:02:30 executing program 0: syz_open_dev$sndctrl(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000300)='lo!bdeveth0^mime_type\x00'}, 0x30) keyctl$chown(0x12, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, r2) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {0x8, 0x1}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400000, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) r6 = socket$xdp(0x2c, 0x3, 0x0) dup3(r6, r5, 0x0) r7 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x561032acc0386146, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r8, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r9, &(0x7f0000000340)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000700)={r9, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x9f15}, &(0x7f0000000300)=0x8) r11 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r12, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r11, 0x84, 0x1f, &(0x7f0000000700)={r13, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f00000003c0)={r10, 0x7fffffff, 0x8, 0xbd, 0x3f, 0x2, 0x3f, 0x1, {r13, @in6={{0xa, 0x4e22, 0x5, @empty, 0x6}}, 0x80000000, 0x0, 0x9, 0xd11}}, &(0x7f0000000480)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r13, @in6={{0xa, 0x4e24, 0xd55, @dev={0xfe, 0x80, [], 0x14}, 0x7fffffff}}, 0x5, 0xd7}, 0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000440)={r13, 0x4, 0x7ff}, 0x8) setregid(0x0, 0x0) 01:02:30 executing program 2: syz_open_dev$sndctrl(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000040)) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000300)='lo!bdeveth0^mime_type\x00'}, 0x30) keyctl$chown(0x12, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, r2) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {0x8, 0x1}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400000, 0x0) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r5 = syz_open_procfs(0x0, 0x0) r6 = socket$xdp(0x2c, 0x3, 0x0) dup3(r6, r5, 0x0) r7 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x561032acc0386146, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r8, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r9, &(0x7f0000000340)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000700)={r9, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000002c0)={r9, 0x9f15}, &(0x7f0000000300)=0x8) r11 = perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') read$FUSE(r12, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r11, 0x84, 0x1f, &(0x7f0000000700)={r13, @in={{0x2, 0x4e22, @remote}}, 0x1000, 0xcc9f}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f00000003c0)={r10, 0x7fffffff, 0x8, 0xbd, 0x3f, 0x2, 0x3f, 0x1, {r13, @in6={{0xa, 0x4e22, 0x5, @empty, 0x6}}, 0x80000000, 0x0, 0x9, 0xd11}}, &(0x7f0000000480)=0xb0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000140)={r13, @in6={{0xa, 0x4e24, 0xd55, @dev={0xfe, 0x80, [], 0x14}, 0x7fffffff}}, 0x5, 0xd7}, 0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000440)={r13, 0x4, 0x7ff}, 0x8) setregid(0x0, 0x0) [ 321.781187][ T2608] device hsr_slave_0 left promiscuous mode [ 321.820786][ T2608] device hsr_slave_1 left promiscuous mode [ 321.867609][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 321.878025][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 321.888569][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 321.935249][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 322.005016][ T2608] bond0 (unregistering): Released all slaves [ 322.141152][ T2608] device hsr_slave_0 left promiscuous mode [ 322.180828][ T2608] device hsr_slave_1 left promiscuous mode [ 322.237986][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 322.248204][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 322.259102][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 322.314398][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 322.403651][ T2608] bond0 (unregistering): Released all slaves [ 322.545648][ T8455] IPVS: ftp: loaded support on port[0] = 21 [ 322.630895][ T8455] chnl_net:caif_netlink_parms(): no params data found [ 322.665759][ T8455] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.673147][ T8455] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.684433][ T8455] device bridge_slave_0 entered promiscuous mode [ 322.780797][ T8455] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.787908][ T8455] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.799486][ T8455] device bridge_slave_1 entered promiscuous mode [ 322.818290][ T8455] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 322.832694][ T8455] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 322.855360][ T8455] team0: Port device team_slave_0 added [ 322.866092][ T8455] team0: Port device team_slave_1 added [ 322.933017][ T8455] device hsr_slave_0 entered promiscuous mode [ 323.040920][ T8455] device hsr_slave_1 entered promiscuous mode [ 323.155461][ T8455] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.162597][ T8455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.169921][ T8455] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.177005][ T8455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.211445][ T8455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 323.224119][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.233003][ T3017] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.241968][ T3017] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.262531][ T8455] 8021q: adding VLAN 0 to HW filter on device team0 [ 323.273949][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.283046][ T3017] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.290076][ T3017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.313640][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.322221][ T7774] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.329365][ T7774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.341322][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 323.350311][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 323.359362][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 323.369878][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.382831][ T8455] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 323.395083][ T8455] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 323.403446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.421201][ T8455] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 323.428973][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 323.437430][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:02:33 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) socket$inet6(0xa, 0x803, 0x3) 01:02:33 executing program 2: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setresuid(0x0, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f00000004c0)={0x2, 0xa3, 0x4, {0x8, @win={{0x200, 0x0, 0xfffffffa, 0x2b80}, 0xc, 0x9, 0x0, 0xfffffffa, &(0x7f0000000080)="222b41e1476e94d422352eca0a5ccdfa22349313300cc4b6904c91f37783fa0b90a82a029a85a43c31aa", 0x3}}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000c40)={{{@in6, @in6=@empty}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xffffffbf) getegid() r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000240)) lstat(0x0, &(0x7f0000000b00)) lstat(0x0, &(0x7f00000017c0)) r8 = socket$inet6(0xa, 0x1, 0x0) fstat(r8, &(0x7f00000002c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet6(0xa, 0x1, 0x0) fstat(r9, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, 0x0, r10, 0x81, 0x7}}}, 0x78) fchown(0xffffffffffffffff, 0x0, r10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r12, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRESOCT=r12, @ANYPTR64=&(0x7f0000000fc0)=ANY=[@ANYRESDEC, @ANYBLOB="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"/459, @ANYBLOB="613346905fb3ca02ea4a1f0e00761aaf7bd8354e5d47b94be0418d0e5ad6ad0f073f5a6f072dcfb6cf81"], @ANYRES32=r11, @ANYBLOB="2a2c55000000000004f194a40b00000006e96fb822db3db7715320f2e2f6be6a04bb20c2e3e4bed94d42e7142340bac971ebc0ec39328f979e5ce48b08a298f21b9992a1199edd8a8bcae30113d4050fc56f7285e8a51ab07a4272274b26eeece5e7b16fbb28496e4d5733d5b538b0da22a024fe8ac51af50248795609d2"], 0x5, 0x0) geteuid() creat(0x0, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80}, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) write$binfmt_script(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) 01:02:33 executing program 0: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setresuid(0x0, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f00000004c0)={0x2, 0xa3, 0x4, {0x8, @win={{0x200, 0x0, 0xfffffffa, 0x2b80}, 0xc, 0x9, 0x0, 0xfffffffa, &(0x7f0000000080)="222b41e1476e94d422352eca0a5ccdfa22349313300cc4b6904c91f37783fa0b90a82a029a85a43c31aa", 0x3}}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000c40)={{{@in6, @in6=@empty}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xffffffbf) getegid() r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000240)) lstat(0x0, &(0x7f0000000b00)) lstat(0x0, &(0x7f00000017c0)) r8 = socket$inet6(0xa, 0x1, 0x0) fstat(r8, &(0x7f00000002c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet6(0xa, 0x1, 0x0) fstat(r9, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, 0x0, r10, 0x81, 0x7}}}, 0x78) fchown(0xffffffffffffffff, 0x0, r10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r12, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRESOCT=r12, @ANYPTR64=&(0x7f0000000fc0)=ANY=[@ANYRESDEC, @ANYBLOB="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"/459, @ANYBLOB="613346905fb3ca02ea4a1f0e00761aaf7bd8354e5d47b94be0418d0e5ad6ad0f073f5a6f072dcfb6cf81"], @ANYRES32=r11, @ANYBLOB="2a2c55000000000004f194a40b00000006e96fb822db3db7715320f2e2f6be6a04bb20c2e3e4bed94d42e7142340bac971ebc0ec39328f979e5ce48b08a298f21b9992a1199edd8a8bcae30113d4050fc56f7285e8a51ab07a4272274b26eeece5e7b16fbb28496e4d5733d5b538b0da22a024fe8ac51af50248795609d2"], 0x5, 0x0) geteuid() creat(0x0, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80}, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) write$binfmt_script(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) 01:02:33 executing program 1: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setresuid(0x0, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f00000004c0)={0x2, 0xa3, 0x4, {0x8, @win={{0x200, 0x0, 0xfffffffa, 0x2b80}, 0xc, 0x9, 0x0, 0xfffffffa, &(0x7f0000000080)="222b41e1476e94d422352eca0a5ccdfa22349313300cc4b6904c91f37783fa0b90a82a029a85a43c31aa", 0x3}}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000c40)={{{@in6, @in6=@empty}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xffffffbf) getegid() r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000240)) lstat(0x0, &(0x7f0000000b00)) lstat(0x0, &(0x7f00000017c0)) r8 = socket$inet6(0xa, 0x1, 0x0) fstat(r8, &(0x7f00000002c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet6(0xa, 0x1, 0x0) fstat(r9, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, 0x0, r10, 0x81, 0x7}}}, 0x78) fchown(0xffffffffffffffff, 0x0, r10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r12, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRESOCT=r12, @ANYPTR64=&(0x7f0000000fc0)=ANY=[@ANYRESDEC, @ANYBLOB="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"/459, @ANYBLOB="613346905fb3ca02ea4a1f0e00761aaf7bd8354e5d47b94be0418d0e5ad6ad0f073f5a6f072dcfb6cf81"], @ANYRES32=r11, @ANYBLOB="2a2c55000000000004f194a40b00000006e96fb822db3db7715320f2e2f6be6a04bb20c2e3e4bed94d42e7142340bac971ebc0ec39328f979e5ce48b08a298f21b9992a1199edd8a8bcae30113d4050fc56f7285e8a51ab07a4272274b26eeece5e7b16fbb28496e4d5733d5b538b0da22a024fe8ac51af50248795609d2"], 0x5, 0x0) geteuid() creat(0x0, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80}, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) write$binfmt_script(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) 01:02:33 executing program 3: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setresuid(0x0, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f00000004c0)={0x2, 0xa3, 0x4, {0x8, @win={{0x200, 0x0, 0xfffffffa, 0x2b80}, 0xc, 0x9, 0x0, 0xfffffffa, &(0x7f0000000080)="222b41e1476e94d422352eca0a5ccdfa22349313300cc4b6904c91f37783fa0b90a82a029a85a43c31aa", 0x3}}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000c40)={{{@in6, @in6=@empty}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xffffffbf) getegid() r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000240)) lstat(0x0, &(0x7f0000000b00)) lstat(0x0, &(0x7f00000017c0)) r8 = socket$inet6(0xa, 0x1, 0x0) fstat(r8, &(0x7f00000002c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet6(0xa, 0x1, 0x0) fstat(r9, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, 0x0, r10, 0x81, 0x7}}}, 0x78) fchown(0xffffffffffffffff, 0x0, r10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r12, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRESOCT=r12, @ANYPTR64=&(0x7f0000000fc0)=ANY=[@ANYRESDEC, @ANYBLOB="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"/459, @ANYBLOB="613346905fb3ca02ea4a1f0e00761aaf7bd8354e5d47b94be0418d0e5ad6ad0f073f5a6f072dcfb6cf81"], @ANYRES32=r11, @ANYBLOB="2a2c55000000000004f194a40b00000006e96fb822db3db7715320f2e2f6be6a04bb20c2e3e4bed94d42e7142340bac971ebc0ec39328f979e5ce48b08a298f21b9992a1199edd8a8bcae30113d4050fc56f7285e8a51ab07a4272274b26eeece5e7b16fbb28496e4d5733d5b538b0da22a024fe8ac51af50248795609d2"], 0x5, 0x0) geteuid() creat(0x0, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80}, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) write$binfmt_script(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) 01:02:33 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES16=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) exit(0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000240)={0x3, "d385d39283e80094e66361a34a5100343aea867e30fd3657f19da0824b4a72bc", 0x3, 0xef5, 0xff, 0xb000, 0x8}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r3 = dup(r2) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000000280)=""/246) read$rfkill(r3, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 01:02:33 executing program 4: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setresuid(0x0, 0x0, 0x0) r3 = dup2(r2, 0xffffffffffffffff) ioctl$VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f00000004c0)={0x2, 0xa3, 0x4, {0x8, @win={{0x200, 0x0, 0xfffffffa, 0x2b80}, 0xc, 0x9, 0x0, 0xfffffffa, &(0x7f0000000080)="222b41e1476e94d422352eca0a5ccdfa22349313300cc4b6904c91f37783fa0b90a82a029a85a43c31aa", 0x3}}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)) r5 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000b34ff8), &(0x7f0000b34ffc)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000c40)={{{@in6, @in6=@empty}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xffffffbf) getegid() r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r7, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) fcntl$getownex(r7, 0x10, &(0x7f0000000240)) lstat(0x0, &(0x7f0000000b00)) lstat(0x0, &(0x7f00000017c0)) r8 = socket$inet6(0xa, 0x1, 0x0) fstat(r8, &(0x7f00000002c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet6(0xa, 0x1, 0x0) fstat(r9, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, 0x0, r10, 0x81, 0x7}}}, 0x78) fchown(0xffffffffffffffff, 0x0, r10) sendmsg$unix(0xffffffffffffffff, 0x0, 0x6010) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) r12 = socket$rds(0x15, 0x5, 0x0) bind$rds(r12, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r12, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRESOCT=r12, @ANYPTR64=&(0x7f0000000fc0)=ANY=[@ANYRESDEC, @ANYBLOB="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"/459, @ANYBLOB="613346905fb3ca02ea4a1f0e00761aaf7bd8354e5d47b94be0418d0e5ad6ad0f073f5a6f072dcfb6cf81"], @ANYRES32=r11, @ANYBLOB="2a2c55000000000004f194a40b00000006e96fb822db3db7715320f2e2f6be6a04bb20c2e3e4bed94d42e7142340bac971ebc0ec39328f979e5ce48b08a298f21b9992a1199edd8a8bcae30113d4050fc56f7285e8a51ab07a4272274b26eeece5e7b16fbb28496e4d5733d5b538b0da22a024fe8ac51af50248795609d2"], 0x5, 0x0) geteuid() creat(0x0, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01, 0x80}, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) write$binfmt_script(r1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000102000007) 01:02:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc}) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) listen(r2, 0x20000003) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r3, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000000)=0x10, 0x4) 01:02:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000000)=""/165) ioctl$TCXONC(r0, 0x560c, 0x0) 01:02:34 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="c0101201000000d802f634d29a4e628baa47a2320479b3f881c71ba4f4cb0000000055b4690000000000000000000000000000000013b9d976b9398e16764fd8494c2588c567ec75c7743a1841ff7b6540dc0e73798a5a65b531d677a10e6a613abab5abb7e879bdf265599aef282729aa3ea903076010f3d4d833842554bc9a9b9a725e97526adc0a8083069a3fcbff2ac3b975f9d9da426f899bd612762bdbf76a64e2"], 0x1) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0xffff, 0x10fffe) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x98) r6 = dup2(r3, r5) dup3(r6, r4, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0x1ff, 0x4) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x16}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r7, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r8, 0x9, r7, 0x2) ioctl$KVM_GET_REGS(r7, 0x8090ae81, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x2000) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2(0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = userfaultfd(0x0) ioctl$UFFDIO_API(r11, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r13 = dup2(r10, r12) dup3(r13, r11, 0x0) bind$ax25(r13, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f00000001c0)={0x0, @adiantum}) 01:02:34 executing program 2: r0 = getpid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004380)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/110, 0x6e}, {&(0x7f00000009c0)=""/115, 0x73}], 0x2, &(0x7f0000000a80)=""/113, 0x71}, 0x8}, {{&(0x7f0000000b00)=@l2, 0x80, 0x0, 0x0, &(0x7f0000002bc0)=""/195, 0xc3}, 0x2}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002d40)=""/191, 0xbf}, {0x0}, {&(0x7f0000002e80)=""/24, 0x18}], 0x3}}, {{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000000280)=""/64, 0x40}, {&(0x7f0000003140)=""/159, 0x9f}, {0x0}], 0x3}, 0x8}], 0x4, 0x0, &(0x7f0000004480)={0x0, 0x1c9c380}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x68, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="5430ac79888bb25316b4252bb1a7cacf"}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}]}, 0x68}, 0x1, 0x0, 0x0, 0x2000000}, 0x800) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a9", 0x4b}], 0x1}, 0x0) dup(r2) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec", 0x3f}], 0x1}, 0x0) r5 = dup2(r3, r4) getsockopt$inet_mreqsrc(r5, 0x0, 0x25, &(0x7f0000000480)={@multicast1, @multicast2, @local}, &(0x7f00000004c0)=0xc) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x40096102, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r9, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r9, 0xae80, 0x0) syz_open_dev$media(0x0, 0x3f, 0x40000) 01:02:34 executing program 1: r0 = socket$inet(0x10, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xfffffffffffffe2d) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000001c0)={0x9, 0x5, 0x7aa5f721, 0x1}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2000000011000d0400"/20, @ANYRES32=r5, @ANYBLOB="00009e5ebb65d958f6236e0ebe35b8eaaa96abccc5515c9e3c5fa3ed1eaa02d74e0a09959fef6a1d914bc8353b932c49f511bbe4059d8278616b800a71d821e67f9ced51b5d18146e5fc02864f98c99876f4c5babaa896034b56852a3f61d6d1dad4bbae48488611792a1f007ba20a1539f7580b58894da1047a"], 0x20}}, 0x0) [ 324.570705][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 324.576511][ C1] protocol 88fb is buggy, dev hsr_slave_1 01:02:34 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xae1d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200047ff, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) fspick(r3, &(0x7f0000000040)='./file0\x00', 0x1) 01:02:34 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x100201, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f00000002c0), 0x4) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000300)={0x6, 'veth1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000240)='.\x00', 0xc0000080) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="ad4b743fd8f794e9a48749399401b3d178d6af1d1ad08bb92e8486a7ee9e79c575e29089c7f89a895cfe4e269ddf273fb6f547ae394726cb2c592faa81b7d163101aa8ba84bf3778de83e5569e0556ad05ce80f721cca46dc7456b2f4fa016bd62d99b"], 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x29) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f00000004c0)={0x75, "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"}) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r4, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a20d01e04d55fb1c26504e3e4738aac76780b5c2363a6dc4d10fe9adc2b363abf6981a31f6a58ef2103e7a145b11649eac6d4cc29a315faf899c2e35d08b1974199c08bf4798207b78d8dd89e727382318265acc85a4444869dfc22ba7fd79b455635a715fa1e705070e2857ef21a3076cdfc2c29b26547360add94ef9c349ae62f54e7a90e1aae762a11b2cc6bd720034fac41f1de628e2a3166ec21e03c68a60708328e1606a83211bc78be79097861ce52747ac474593d76f9ec5cdd91725cb16e62b4bb027fbb96eab344de0401076c6345a7d32e9fe9ba1e68ac07081a7d1e0ed1eb9e96b41214af554f1831dfd8bd2b466789f4295317d17c138abe5fa9044a44792e9aecfb3f9130ff673786a8ef2b14c4999c29a5713c2fb5e35f2fae0d58b64355a697efd45e36528e57c68a62c6edc7879962e05419c7c5fa64ec92e670821df50d0f3a7312d2120f363954e72ba0322fc4318f819b1e2b1a17fb939a5db9c1a0a83b44abcffc3dd555d4dd30c0a4bd524c29d4d57bc906c012446c99a882162f3f72cce0702d7394288807fe2a308e01adc9bbf2a9cd78fabaa3c10640777e0813726a70df3323924035b235fd39ae4ab08d3f09bd231b38dca4389b098b0d3538dd3ef5bf068c1df8fbe00b0b2aa9ec3de5d3fba56594328a643c2799b8371adc6ecdfd9b9c4e52102eaa83b57da14645e442b4b7ad5f555d872dc50c330d145ca853b768b990dbaa18ab7f7e2e2d695e980f96d646e8c893ad912bc71237e9aa3ef2d8a4", 0x261, 0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r6, 0x9, r5, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106}}, 0x20) 01:02:34 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:34 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="c0101201000000d802f634d29a4e628baa47a2320479b3f881c71ba4f4cb0000000055b4690000000000000000000000000000000013b9d976b9398e16764fd8494c2588c567ec75c7743a1841ff7b6540dc0e73798a5a65b531d677a10e6a613abab5abb7e879bdf265599aef282729aa3ea903076010f3d4d833842554bc9a9b9a725e97526adc0a8083069a3fcbff2ac3b975f9d9da426f899bd612762bdbf76a64e2"], 0x1) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0xffff, 0x10fffe) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x98) r6 = dup2(r3, r5) dup3(r6, r4, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0x1ff, 0x4) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x16}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r7, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r8, 0x9, r7, 0x2) ioctl$KVM_GET_REGS(r7, 0x8090ae81, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x2000) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2(0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = userfaultfd(0x0) ioctl$UFFDIO_API(r11, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r13 = dup2(r10, r12) dup3(r13, r11, 0x0) bind$ax25(r13, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f00000001c0)={0x0, @adiantum}) [ 325.050711][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 325.056581][ C0] protocol 88fb is buggy, dev hsr_slave_1 01:02:35 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="c0101201000000d802f634d29a4e628baa47a2320479b3f881c71ba4f4cb0000000055b4690000000000000000000000000000000013b9d976b9398e16764fd8494c2588c567ec75c7743a1841ff7b6540dc0e73798a5a65b531d677a10e6a613abab5abb7e879bdf265599aef282729aa3ea903076010f3d4d833842554bc9a9b9a725e97526adc0a8083069a3fcbff2ac3b975f9d9da426f899bd612762bdbf76a64e2"], 0x1) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0xffff, 0x10fffe) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x98) r6 = dup2(r3, r5) dup3(r6, r4, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0x1ff, 0x4) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x16}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r7, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r8, 0x9, r7, 0x2) ioctl$KVM_GET_REGS(r7, 0x8090ae81, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x2000) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2(0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = userfaultfd(0x0) ioctl$UFFDIO_API(r11, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r13 = dup2(r10, r12) dup3(r13, r11, 0x0) bind$ax25(r13, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f00000001c0)={0x0, @adiantum}) 01:02:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="c0101201000000d802f634d29a4e628baa47a2320479b3f881c71ba4f4cb0000000055b4690000000000000000000000000000000013b9d976b9398e16764fd8494c2588c567ec75c7743a1841ff7b6540dc0e73798a5a65b531d677a10e6a613abab5abb7e879bdf265599aef282729aa3ea903076010f3d4d833842554bc9a9b9a725e97526adc0a8083069a3fcbff2ac3b975f9d9da426f899bd612762bdbf76a64e2"], 0x1) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0xffff, 0x10fffe) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x98) r6 = dup2(r3, r5) dup3(r6, r4, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0x1ff, 0x4) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x16}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r7, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r8, 0x9, r7, 0x2) ioctl$KVM_GET_REGS(r7, 0x8090ae81, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x2000) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2(0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = userfaultfd(0x0) ioctl$UFFDIO_API(r11, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r13 = dup2(r10, r12) dup3(r13, r11, 0x0) bind$ax25(r13, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f00000001c0)={0x0, @adiantum}) 01:02:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = socket$inet(0x2, 0x6, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='bdev\x00') ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000001600)={{0x2, 0x4e23, @multicast1}, {0x1, @random="0b92714eca4f"}, 0x5e, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'veth1_to_bond\x00'}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 01:02:35 executing program 2: r0 = getpid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004380)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/110, 0x6e}, {&(0x7f00000009c0)=""/115, 0x73}], 0x2, &(0x7f0000000a80)=""/113, 0x71}, 0x8}, {{&(0x7f0000000b00)=@l2, 0x80, 0x0, 0x0, &(0x7f0000002bc0)=""/195, 0xc3}, 0x2}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002d40)=""/191, 0xbf}, {0x0}, {&(0x7f0000002e80)=""/24, 0x18}], 0x3}}, {{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000000280)=""/64, 0x40}, {&(0x7f0000003140)=""/159, 0x9f}, {0x0}], 0x3}, 0x8}], 0x4, 0x0, &(0x7f0000004480)={0x0, 0x1c9c380}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x68, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="5430ac79888bb25316b4252bb1a7cacf"}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}]}, 0x68}, 0x1, 0x0, 0x0, 0x2000000}, 0x800) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a9", 0x4b}], 0x1}, 0x0) dup(r2) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec", 0x3f}], 0x1}, 0x0) r5 = dup2(r3, r4) getsockopt$inet_mreqsrc(r5, 0x0, 0x25, &(0x7f0000000480)={@multicast1, @multicast2, @local}, &(0x7f00000004c0)=0xc) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x40096102, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r9, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r9, 0xae80, 0x0) syz_open_dev$media(0x0, 0x3f, 0x40000) 01:02:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="c0101201000000d802f634d29a4e628baa47a2320479b3f881c71ba4f4cb0000000055b4690000000000000000000000000000000013b9d976b9398e16764fd8494c2588c567ec75c7743a1841ff7b6540dc0e73798a5a65b531d677a10e6a613abab5abb7e879bdf265599aef282729aa3ea903076010f3d4d833842554bc9a9b9a725e97526adc0a8083069a3fcbff2ac3b975f9d9da426f899bd612762bdbf76a64e2"], 0x1) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0xffff, 0x10fffe) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x98) r6 = dup2(r3, r5) dup3(r6, r4, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0x1ff, 0x4) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x16}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r7, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r8, 0x9, r7, 0x2) ioctl$KVM_GET_REGS(r7, 0x8090ae81, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x2000) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2(0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = userfaultfd(0x0) ioctl$UFFDIO_API(r11, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r13 = dup2(r10, r12) dup3(r13, r11, 0x0) bind$ax25(r13, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f00000001c0)={0x0, @adiantum}) 01:02:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="c0101201000000d802f634d29a4e628baa47a2320479b3f881c71ba4f4cb0000000055b4690000000000000000000000000000000013b9d976b9398e16764fd8494c2588c567ec75c7743a1841ff7b6540dc0e73798a5a65b531d677a10e6a613abab5abb7e879bdf265599aef282729aa3ea903076010f3d4d833842554bc9a9b9a725e97526adc0a8083069a3fcbff2ac3b975f9d9da426f899bd612762bdbf76a64e2"], 0x1) fallocate(r2, 0x0, 0x40000, 0x4) fallocate(r1, 0x0, 0xffff, 0x10fffe) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = userfaultfd(0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x98) r6 = dup2(r3, r5) dup3(r6, r4, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000100)=0x1ff, 0x4) fdatasync(r2) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xd000000, r2, 0x0, 0x0, 0x0, 0x16}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r7, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r8, 0x9, r7, 0x2) ioctl$KVM_GET_REGS(r7, 0x8090ae81, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x2000) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe2(0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r10 = socket$inet_udplite(0x2, 0x2, 0x88) r11 = userfaultfd(0x0) ioctl$UFFDIO_API(r11, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x74, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r13 = dup2(r10, r12) dup3(r13, r11, 0x0) bind$ax25(r13, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r9, 0x400c6615, &(0x7f00000001c0)={0x0, @adiantum}) 01:02:36 executing program 4: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x100201, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f00000002c0), 0x4) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000300)={0x6, 'veth1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000240)='.\x00', 0xc0000080) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="ad4b743fd8f794e9a48749399401b3d178d6af1d1ad08bb92e8486a7ee9e79c575e29089c7f89a895cfe4e269ddf273fb6f547ae394726cb2c592faa81b7d163101aa8ba84bf3778de83e5569e0556ad05ce80f721cca46dc7456b2f4fa016bd62d99b"], 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x29) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f00000004c0)={0x75, "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"}) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r4, &(0x7f0000000640)="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", 0x261, 0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r6, 0x9, r5, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106}}, 0x20) 01:02:36 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x100201, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f00000002c0), 0x4) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000300)={0x6, 'veth1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000240)='.\x00', 0xc0000080) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="ad4b743fd8f794e9a48749399401b3d178d6af1d1ad08bb92e8486a7ee9e79c575e29089c7f89a895cfe4e269ddf273fb6f547ae394726cb2c592faa81b7d163101aa8ba84bf3778de83e5569e0556ad05ce80f721cca46dc7456b2f4fa016bd62d99b"], 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x29) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f00000004c0)={0x75, "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"}) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r4, &(0x7f0000000640)="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", 0x261, 0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r6, 0x9, r5, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106}}, 0x20) [ 326.521916][ T2608] device bridge_slave_1 left promiscuous mode [ 326.528998][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.625919][ T2608] device bridge_slave_0 left promiscuous mode [ 326.637445][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:36 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = socket$inet(0x2, 0x6, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='bdev\x00') ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000001600)={{0x2, 0x4e23, @multicast1}, {0x1, @random="0b92714eca4f"}, 0x5e, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'veth1_to_bond\x00'}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 01:02:37 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020700090200000000006500bd5a0000003d472aefe41c4301889c91ff7f000000001600aa20475d9f02d3869feeed860e6cc4e0323ae0cad7cb2f8a912161bc79c981e8b802c0da69050046b653e1200000000000000041374611771c853ca81d1bfa43f5f59ca73051ee3be4e1d47f8dce278640cd48f42491ba1574eb92d5b4789991b4c1334b14caed05929d81bc65c9e15917fc01885700469a1466938507e0e7a5119d7aa0c4e3b8660de5237448a099e4c47726fc366f3a62a0da3dd3e5e21703f828c877e228ea9059c77e351a95febf64356728a000ce5fd1c2328f285f89851fa0451fd0e0c66f9a3c107bb9c13c8981fb8d16e5eb1a09c50acd1337bd634b77abdc3efffb2583860d4dd63c19b98dc242e4e1a7a4"], 0x10}}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r3 = socket$inet(0x2, 0x6, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='bdev\x00') ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000001600)={{0x2, 0x4e23, @multicast1}, {0x1, @random="0b92714eca4f"}, 0x5e, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'veth1_to_bond\x00'}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 01:02:37 executing program 4: r0 = getpid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004380)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/110, 0x6e}, {&(0x7f00000009c0)=""/115, 0x73}], 0x2, &(0x7f0000000a80)=""/113, 0x71}, 0x8}, {{&(0x7f0000000b00)=@l2, 0x80, 0x0, 0x0, &(0x7f0000002bc0)=""/195, 0xc3}, 0x2}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002d40)=""/191, 0xbf}, {0x0}, {&(0x7f0000002e80)=""/24, 0x18}], 0x3}}, {{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000000280)=""/64, 0x40}, {&(0x7f0000003140)=""/159, 0x9f}, {0x0}], 0x3}, 0x8}], 0x4, 0x0, &(0x7f0000004480)={0x0, 0x1c9c380}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x68, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="5430ac79888bb25316b4252bb1a7cacf"}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}]}, 0x68}, 0x1, 0x0, 0x0, 0x2000000}, 0x800) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a9", 0x4b}], 0x1}, 0x0) dup(r2) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec", 0x3f}], 0x1}, 0x0) r5 = dup2(r3, r4) getsockopt$inet_mreqsrc(r5, 0x0, 0x25, &(0x7f0000000480)={@multicast1, @multicast2, @local}, &(0x7f00000004c0)=0xc) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x40096102, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r9, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r9, 0xae80, 0x0) syz_open_dev$media(0x0, 0x3f, 0x40000) [ 329.204227][ T2608] device hsr_slave_0 left promiscuous mode [ 329.263854][ T2608] device hsr_slave_1 left promiscuous mode [ 329.318470][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 329.364871][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 329.411152][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 329.468253][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 329.547815][ T2608] bond0 (unregistering): Released all slaves [ 329.675607][ T8691] IPVS: ftp: loaded support on port[0] = 21 [ 329.820898][ T8691] chnl_net:caif_netlink_parms(): no params data found [ 329.854296][ T8691] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.861415][ T8691] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.869228][ T8691] device bridge_slave_0 entered promiscuous mode [ 329.880073][ T8691] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.887281][ T8691] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.897764][ T8691] device bridge_slave_1 entered promiscuous mode [ 329.916312][ T8691] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 329.929868][ T8691] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 329.949205][ T8691] team0: Port device team_slave_0 added [ 329.958559][ T8691] team0: Port device team_slave_1 added [ 330.042771][ T8691] device hsr_slave_0 entered promiscuous mode [ 330.113659][ T8691] device hsr_slave_1 entered promiscuous mode [ 330.153783][ T8691] debugfs: Directory 'hsr0' with parent '/' already present! [ 330.168844][ T8691] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.175922][ T8691] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.183320][ T8691] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.190347][ T8691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.226185][ T8691] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.238567][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 330.247184][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.255484][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.269891][ T8691] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.280907][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 330.289488][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.296580][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.323901][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 330.333360][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.340543][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.349431][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 330.358368][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 330.366987][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 330.375451][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 330.384324][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 330.395890][ T8691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 330.410838][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 330.418432][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 330.429952][ T8691] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.519911][ T8701] IPVS: ftp: loaded support on port[0] = 21 [ 330.598099][ T8701] chnl_net:caif_netlink_parms(): no params data found [ 330.637463][ T8701] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.647486][ T8701] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.655729][ T8701] device bridge_slave_0 entered promiscuous mode [ 330.663724][ T8701] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.670901][ T8701] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.678568][ T8701] device bridge_slave_1 entered promiscuous mode 01:02:40 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:40 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) r3 = semget(0x3, 0x0, 0x21) semctl$SETVAL(r3, 0x0, 0x10, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r1, r4, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x101102, 0x0) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x9, 0x8040, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@mcast1, 0x4e23, 0x0, 0x4e22, 0x0, 0xa, 0xc0, 0xc0, 0x2c, 0x0, r7}, {0x80, 0x0, 0x400, 0x1f, 0x3, 0x206, 0x0, 0x7}, {0x3, 0x0, 0x1, 0x9}, 0x2, 0x6e6bbe, 0x0, 0x0, 0x1, 0x3}, {{@in=@local, 0x4d5, 0xe}, 0x2, @in=@local, 0x3500, 0x0, 0x2, 0x1f, 0xfffffc01, 0x3, 0x40}}, 0xe8) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCINQ(r8, 0x541b, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) prctl$PR_SET_FPEXC(0xc, 0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) 01:02:40 executing program 2: r0 = getpid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004380)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/110, 0x6e}, {&(0x7f00000009c0)=""/115, 0x73}], 0x2, &(0x7f0000000a80)=""/113, 0x71}, 0x8}, {{&(0x7f0000000b00)=@l2, 0x80, 0x0, 0x0, &(0x7f0000002bc0)=""/195, 0xc3}, 0x2}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002d40)=""/191, 0xbf}, {0x0}, {&(0x7f0000002e80)=""/24, 0x18}], 0x3}}, {{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000000280)=""/64, 0x40}, {&(0x7f0000003140)=""/159, 0x9f}, {0x0}], 0x3}, 0x8}], 0x4, 0x0, &(0x7f0000004480)={0x0, 0x1c9c380}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x68, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="5430ac79888bb25316b4252bb1a7cacf"}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}]}, 0x68}, 0x1, 0x0, 0x0, 0x2000000}, 0x800) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a9", 0x4b}], 0x1}, 0x0) dup(r2) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec", 0x3f}], 0x1}, 0x0) r5 = dup2(r3, r4) getsockopt$inet_mreqsrc(r5, 0x0, 0x25, &(0x7f0000000480)={@multicast1, @multicast2, @local}, &(0x7f00000004c0)=0xc) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x40096102, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r9, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r9, 0xae80, 0x0) syz_open_dev$media(0x0, 0x3f, 0x40000) 01:02:40 executing program 0: openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x100201, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f00000002c0), 0x4) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8983, &(0x7f0000000300)={0x6, 'veth1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000240)='.\x00', 0xc0000080) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="ad4b743fd8f794e9a48749399401b3d178d6af1d1ad08bb92e8486a7ee9e79c575e29089c7f89a895cfe4e269ddf273fb6f547ae394726cb2c592faa81b7d163101aa8ba84bf3778de83e5569e0556ad05ce80f721cca46dc7456b2f4fa016bd62d99b"], 0x1) preadv(0xffffffffffffffff, 0x0, 0x0, 0x29) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$USBDEVFS_GETDRIVER(0xffffffffffffffff, 0x41045508, &(0x7f00000004c0)={0x75, "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"}) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r4, &(0x7f0000000640)="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", 0x261, 0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r5, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r6, 0x9, r5, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x106}}, 0x20) 01:02:40 executing program 3: r0 = getpid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004380)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/110, 0x6e}, {&(0x7f00000009c0)=""/115, 0x73}], 0x2, &(0x7f0000000a80)=""/113, 0x71}, 0x8}, {{&(0x7f0000000b00)=@l2, 0x80, 0x0, 0x0, &(0x7f0000002bc0)=""/195, 0xc3}, 0x2}, {{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000002d40)=""/191, 0xbf}, {0x0}, {&(0x7f0000002e80)=""/24, 0x18}], 0x3}}, {{0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000000280)=""/64, 0x40}, {&(0x7f0000003140)=""/159, 0x9f}, {0x0}], 0x3}, 0x8}], 0x4, 0x0, &(0x7f0000004480)={0x0, 0x1c9c380}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8200}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x68, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @rand_addr="5430ac79888bb25316b4252bb1a7cacf"}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e20}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback}]}, 0x68}, 0x1, 0x0, 0x0, 0x2000000}, 0x800) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a9", 0x4b}], 0x1}, 0x0) dup(r2) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(r4, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000000a43ba5d806055b6fdd80b40000000140001000029ec", 0x3f}], 0x1}, 0x0) r5 = dup2(r3, r4) getsockopt$inet_mreqsrc(r5, 0x0, 0x25, &(0x7f0000000480)={@multicast1, @multicast2, @local}, &(0x7f00000004c0)=0xc) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x40096102, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000140)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r9, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r9, 0xae80, 0x0) syz_open_dev$media(0x0, 0x3f, 0x40000) [ 330.698491][ T8701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 330.709273][ T8701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:02:40 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) r3 = semget(0x3, 0x0, 0x21) semctl$SETVAL(r3, 0x0, 0x10, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r1, r4, 0x0) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x101102, 0x0) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x9, 0x8040, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r7 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@mcast1, 0x4e23, 0x0, 0x4e22, 0x0, 0xa, 0xc0, 0xc0, 0x2c, 0x0, r7}, {0x80, 0x0, 0x400, 0x1f, 0x3, 0x206, 0x0, 0x7}, {0x3, 0x0, 0x1, 0x9}, 0x2, 0x6e6bbe, 0x0, 0x0, 0x1, 0x3}, {{@in=@local, 0x4d5, 0xe}, 0x2, @in=@local, 0x3500, 0x0, 0x2, 0x1f, 0xfffffc01, 0x3, 0x40}}, 0xe8) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCINQ(r8, 0x541b, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) prctl$PR_SET_FPEXC(0xc, 0x2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x7a, &(0x7f000059aff8)={r9}, &(0x7f000034f000)=0x2059b000) [ 331.342621][ T8701] team0: Port device team_slave_0 added [ 331.415001][ T8701] team0: Port device team_slave_1 added [ 331.476823][ T8701] device hsr_slave_0 entered promiscuous mode [ 331.511294][ T8701] device hsr_slave_1 entered promiscuous mode [ 331.560805][ T8701] debugfs: Directory 'hsr0' with parent '/' already present! [ 331.837131][ T8701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 331.849453][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 331.857794][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 331.868319][ T8701] 8021q: adding VLAN 0 to HW filter on device team0 [ 331.931404][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 331.941005][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 331.949543][ T3017] bridge0: port 1(bridge_slave_0) entered blocking state [ 331.956665][ T3017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 331.964610][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 331.973564][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 331.982444][ T3017] bridge0: port 2(bridge_slave_1) entered blocking state [ 331.989495][ T3017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 331.997436][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 332.006616][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 332.015927][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.074796][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 332.084408][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 332.093572][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 332.111432][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 332.120285][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 332.129451][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.138633][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.208413][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.217142][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.226933][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 332.242599][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 332.250036][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 332.318679][ T8701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 332.451438][ T2608] device bridge_slave_1 left promiscuous mode [ 332.458109][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.501816][ T2608] device bridge_slave_0 left promiscuous mode [ 332.509262][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.573007][ T2608] device bridge_slave_1 left promiscuous mode [ 332.579355][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state 01:02:42 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) getcwd(&(0x7f0000000440)=""/82, 0x52) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r1, &(0x7f0000001200)=""/25, 0xfec9) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r2, &(0x7f0000001200)=""/25, 0xfec9) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000640)="d76821232271561fcafad64aba3b1334a85e5afc4e325044b5a95e4764a59e5e07d293abb7dd7f5d7da9951fded8d59bc5fedf2889d291907690c1d19bfbc1d21961d856132a9becbebc8c66ff372ba2356a88a98e188fc4720edfe1a1d0b3405f83f01115afece68c97a09e9957af229d26bc685310d47604daf31525e3de485d6bb2fd146d0d876a6b24b418d3bc6145f3c5125a057e3080835f0f0f3c1bcb68b8b41619beecd0858f23e2c419b6d976d0338107ad9b65162e33fcd76f7f", 0xbf, r2) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$describe(0x6, r3, &(0x7f0000001200)=""/25, 0xfec9) r4 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$BLKPBSZGET(r4, 0x127b, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='htcp\x00', 0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = accept(r5, &(0x7f0000000740)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f00000005c0)=0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, 0x0, &(0x7f0000000580)=0xfffffffffffffff6) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x8001, 0x4}, 0xfffffffffffffdc8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @remote}}, [0xdf82, 0xa9, 0x100, 0x0, 0x7, 0xd2, 0x5, 0x6, 0x0, 0x2, 0x1, 0x10, 0x3, 0xec]}, &(0x7f00000003c0)=0x100) 01:02:42 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:42 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x875, 0x400) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r5, 0x9, r4, 0x2) capget(&(0x7f0000000000)={0x40013548, r5}, &(0x7f0000000040)={0x5, 0x8, 0x0, 0x3, 0x2}) ptrace$peekuser(0x3, r5, 0x1) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r7, 0x9, r6, 0x2) ioctl$BINDER_THREAD_EXIT(r6, 0x40046208, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8008551c, &(0x7f0000000080)) 01:02:42 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x4, 0x20000) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xfffffffffffffffc, r0, 0x0) close(0xffffffffffffffff) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x22}, 0xc) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$radio(0x0, 0x3, 0x2) write$UHID_CREATE(r2, &(0x7f00000001c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x0, 0x6, 0x7b5, 0x4, 0x0, 0x7}, 0x120) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000000140)=0x6, 0x4) fsetxattr(r1, 0x0, &(0x7f0000000300)='/dev/radio#\x00', 0xc, 0x1) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000240)='inpu[\x00\x00%\x17\x82\x00', 0x0, 0xc80) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0xfc, 0xe5}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r5, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac610ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r6 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r6, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r6, 0x20000003) r7 = accept4(r6, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f0000003700)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) connect(r7, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) setsockopt$netrom_NETROM_N2(r7, 0x103, 0x3, &(0x7f0000000180)=0x2, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) sendto$inet(r2, &(0x7f0000000500)="6bb3c52c9f9ee86fb44dd6dc311a5ce87cceec4f44bc92332c8e5679eeb388043617f453f635c27f182a94970cc816601581123226410da19532680e6ad975e371655576ffebf328cd76a9c74309e2176ea6423d50a60a3570442636ed0058f5e9afb28dfa55c5b3bf9091f842b933f3613d71781d57e1462f0c5641acb96de4349e3708260d50da9d9ccbc1b5f1f59e3bdec5e142749b2c31e63feeb49e2a114fb909cadb96aa29074a52c25fc0685ecc2e8d00c4eb701e047e579ce810259a431180db51a0062f958971f4dda1be03019c7c4fbe7addc43f", 0xd9, 0x4000008, 0x0, 0x0) 01:02:42 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0x4c, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3(', 0x3, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) [ 332.631521][ T2608] device bridge_slave_0 left promiscuous mode [ 332.637815][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160554]}) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000480)=""/174) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000040)={0x1f, {0x0, 0xff, 0x6e, 0xfd}}, 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000300)=@known='com.apple.system.Security\x00', 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f00000003c0)="660fe74e0882ab008000008bb8000000000f23c00f21f835010001000f23f867dac166baf80cb8d6006d8aef66bafc0c66ed66ba4300ec0f20d835200000000f22d866bad004ec66baf80cb88242b284ef66bafc0c66b8000066ef0f01cf", 0x5e}], 0x1, 0x28, 0x0, 0x0) 01:02:43 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@nfc={0x27, 0x1, 0x0, 0xe}, 0x80) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000140)={0x8151, 0x5, 0x4, 0x1000, {}, {0x2, 0xc, 0xc0, 0x0, 0x80, 0x2, "741b44e3"}, 0x1bb, 0x2, @fd=0xffffffffffffffff, 0x4}) fstatfs(r1, &(0x7f00000001c0)=""/171) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b702000000000400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000d83990832ffdd40a409f01f6147c8f6fd267bf41106f89ec68823ce3c4bcc4ce81e97719ea969f2a019a6137ad1efc966f1cfdc4ea29f673efc20c8dec082bc6de68ab0a5ebf4ee60253518172b4226cc871311ab25868e1d9a0142636973f338d2d41c41e415a2bcc922a3aa71489fad041e59cc9f6e79e0993c96e4c43518cf72e4bcff56cf5a863efb43ea723476ab7140606791e81960ea313ea74c2cde2dedd424a4596f98e3e70a6f1d8abce75f01dbb60bdf7316a57b39031cc158a0a4c6dd4880c767f39a161b050abc5a34588ea19114caebb7995"], &(0x7f0000000100)='GPL\x00'}, 0x48) pipe(&(0x7f00000008c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:02:43 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r0 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x7f, 0x1000) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000380)={0x3, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) [ 333.365867][ T7895] libceph: connect (1)[d::]:6789 error -101 [ 333.372213][ T7895] libceph: mon0 (1)[d::]:6789 connect error 01:02:43 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, 0xffffffffffffffff, 0x0) [ 333.650039][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 333.650054][ T26] audit: type=1800 audit(1576112563.587:31): pid=8768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=22 res=0 01:02:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) getcwd(&(0x7f0000000440)=""/82, 0x52) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r1, &(0x7f0000001200)=""/25, 0xfec9) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r2, &(0x7f0000001200)=""/25, 0xfec9) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000640)="d76821232271561fcafad64aba3b1334a85e5afc4e325044b5a95e4764a59e5e07d293abb7dd7f5d7da9951fded8d59bc5fedf2889d291907690c1d19bfbc1d21961d856132a9becbebc8c66ff372ba2356a88a98e188fc4720edfe1a1d0b3405f83f01115afece68c97a09e9957af229d26bc685310d47604daf31525e3de485d6bb2fd146d0d876a6b24b418d3bc6145f3c5125a057e3080835f0f0f3c1bcb68b8b41619beecd0858f23e2c419b6d976d0338107ad9b65162e33fcd76f7f", 0xbf, r2) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$describe(0x6, r3, &(0x7f0000001200)=""/25, 0xfec9) r4 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$BLKPBSZGET(r4, 0x127b, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000001c0)='htcp\x00', 0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20048a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r6 = accept(r5, &(0x7f0000000740)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f00000005c0)=0x80) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, 0x0, &(0x7f0000000580)=0xfffffffffffffff6) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x8001, 0x4}, 0xfffffffffffffdc8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @remote}}, [0xdf82, 0xa9, 0x100, 0x0, 0x7, 0xd2, 0x5, 0x6, 0x0, 0x2, 0x1, 0x10, 0x3, 0xec]}, &(0x7f00000003c0)=0x100) [ 333.748487][ T26] audit: type=1804 audit(1576112563.617:32): pid=8768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/18/file0/file0" dev="loop2" ino=22 res=1 [ 333.781114][ T8768] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 333.850788][ T8768] FAT-fs (loop2): Filesystem has been set read-only [ 333.856293][ T26] audit: type=1804 audit(1576112563.717:33): pid=8771 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/18/file0/file0" dev="loop2" ino=22 res=1 [ 333.858080][ T8768] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 01:02:44 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r0 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x7f, 0x1000) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000380)={0x3, 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::6:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 01:02:44 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, 0xffffffffffffffff, 0x0) 01:02:44 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, 0xffffffffffffffff, 0x0) [ 334.503318][ T26] audit: type=1800 audit(1576112564.447:34): pid=8785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=23 res=0 [ 334.615744][ T26] audit: type=1804 audit(1576112564.557:35): pid=8785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/19/file0/file0" dev="loop2" ino=23 res=1 [ 334.771838][ T26] audit: type=1800 audit(1576112564.587:36): pid=8792 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=24 res=0 [ 334.814592][ T8785] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 334.837870][ T26] audit: type=1804 audit(1576112564.637:37): pid=8792 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir526166456/syzkaller.g2rO79/3/file0/file0" dev="loop1" ino=24 res=1 [ 334.871345][ T8785] FAT-fs (loop2): Filesystem has been set read-only [ 334.878497][ T8792] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 334.888814][ T8785] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 334.906843][ T8792] FAT-fs (loop1): Filesystem has been set read-only [ 334.925846][ T26] audit: type=1804 audit(1576112564.707:38): pid=8794 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/19/file0/file0" dev="loop2" ino=23 res=1 [ 334.927337][ T8792] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 334.977002][ T26] audit: type=1804 audit(1576112564.777:39): pid=8798 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir526166456/syzkaller.g2rO79/3/file0/file0" dev="loop1" ino=24 res=1 [ 335.981122][ T2608] device hsr_slave_0 left promiscuous mode [ 336.020783][ T2608] device hsr_slave_1 left promiscuous mode [ 336.087749][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 336.098844][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 336.111212][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 336.134540][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 336.200693][ T2608] bond0 (unregistering): Released all slaves [ 336.341261][ T2608] device hsr_slave_0 left promiscuous mode [ 336.380870][ T2608] device hsr_slave_1 left promiscuous mode [ 336.427447][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 336.438636][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 336.449258][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 336.505170][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 336.573429][ T2608] bond0 (unregistering): Released all slaves 01:02:46 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x875, 0x400) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x2000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r5, 0x9, r4, 0x2) capget(&(0x7f0000000000)={0x40013548, r5}, &(0x7f0000000040)={0x5, 0x8, 0x0, 0x3, 0x2}) ptrace$peekuser(0x3, r5, 0x1) r6 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r7, 0x9, r6, 0x2) ioctl$BINDER_THREAD_EXIT(r6, 0x40046208, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8008551c, &(0x7f0000000080)) 01:02:46 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, 0xffffffffffffffff, 0x0) [ 336.835787][ T26] audit: type=1800 audit(1576112566.777:40): pid=8807 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=25 res=0 [ 336.866060][ T8805] IPVS: ftp: loaded support on port[0] = 21 [ 336.996668][ T8807] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 337.006946][ T8807] FAT-fs (loop2): Filesystem has been set read-only [ 337.015045][ T8807] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 337.169528][ T8805] chnl_net:caif_netlink_parms(): no params data found [ 337.218838][ T8805] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.229118][ T8805] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.237722][ T8805] device bridge_slave_0 entered promiscuous mode [ 337.248790][ T8805] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.256814][ T8805] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.268455][ T8805] device bridge_slave_1 entered promiscuous mode [ 337.292091][ T8805] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 337.306527][ T8805] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 337.329979][ T8805] team0: Port device team_slave_0 added [ 337.337604][ T8805] team0: Port device team_slave_1 added [ 337.416978][ T8805] device hsr_slave_0 entered promiscuous mode [ 337.481255][ T8805] device hsr_slave_1 entered promiscuous mode [ 337.553564][ T8805] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.560696][ T8805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.569099][ T8805] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.576304][ T8805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.618364][ T8805] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.632732][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 337.641550][ T3515] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.649701][ T3515] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.673251][ T8805] 8021q: adding VLAN 0 to HW filter on device team0 [ 337.689283][ T7773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 337.698833][ T7773] bridge0: port 1(bridge_slave_0) entered blocking state [ 337.706031][ T7773] bridge0: port 1(bridge_slave_0) entered forwarding state [ 337.738924][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.748447][ T7774] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.755969][ T7774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.765712][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 337.775053][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 337.788849][ T8805] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 337.799851][ T8805] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 337.812421][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 337.821224][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.830190][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.839284][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.848558][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.857720][ T7774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 337.879208][ T8805] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 337.887571][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 337.895432][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 338.059643][ T8827] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.068625][ T8827] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:48 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:48 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, 0xffffffffffffffff, 0x0) 01:02:48 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x800, 0x4, 0x2}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xaf, 0xc02c0) sendto$inet6(r1, &(0x7f0000000100)="785d0c2ccc1e7aaf0eeee5370ea6fabdfe5207c100ad4ef482fd001f5c13506c1ba67f53c2689aff0b625a94c3fadcab45da6499c0740126dea3ba3f3c8a4320c073ee18f26ec666b7c795d5ac301f8c0cd9681c5ccd198df78a8d9d6892866577a7998b5eb5ce0653fd42c834a25bc420ec2145b5742df8ba60e6c399e8b5b50cc91f37ed686f22b7b9fbba41d664e17b67ab5d0c20410d8ee49bb7937a45be9f4e2c52a9585ef0fef9c74ca41beae63babd6ad2e73538a07951f505cb191bc73f2fde7f5cfca5f2fb29321abcdc815a0283db8668f3eb082f73a", 0xdb, 0x8000, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0xd}, 0x9}, 0x1c) socket$kcm(0x2, 0x200000000000001, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x404000, 0x3) 01:02:48 executing program 0: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x4000, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000240)={0x9}, 0xc) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x101000, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r2, 0x9, r1, 0x2) perf_event_open$cgroup(0x0, r1, 0xe, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(r3, 0x0, 0x200002, 0x0) 01:02:48 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x1000002, 0x8012, 0xffffffffffffffff, 0x0) 01:02:48 executing program 4: creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000300)={0x30, 0x5, 0x0, {0x0, 0x3, 0x8, 0x8}}, 0x30) creat(&(0x7f0000000140)='./bus\x00', 0x0) r5 = socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x200080}, 0xc) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000480)={0x7, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}]}) r8 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x8000fffffffe) ioctl$RTC_ALM_READ(r8, 0x80247008, &(0x7f0000000080)) [ 338.657081][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 338.657096][ T26] audit: type=1800 audit(1576112568.597:44): pid=8834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=27 res=0 [ 338.803810][ T26] audit: type=1804 audit(1576112568.607:45): pid=8831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir526166456/syzkaller.g2rO79/4/file0/file0" dev="loop1" ino=26 res=1 01:02:48 executing program 0: [ 338.879001][ T8831] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 338.904394][ T8834] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 338.948042][ T8831] FAT-fs (loop1): Filesystem has been set read-only [ 338.955110][ T26] audit: type=1804 audit(1576112568.647:46): pid=8834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/21/file0/file0" dev="loop2" ino=27 res=1 [ 338.955189][ T26] audit: type=1804 audit(1576112568.717:47): pid=8843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir526166456/syzkaller.g2rO79/4/file0/file0" dev="loop1" ino=26 res=1 [ 338.955228][ T26] audit: type=1804 audit(1576112568.777:48): pid=8844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/21/file0/file0" dev="loop2" ino=27 res=1 [ 339.029299][ T8831] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 339.036999][ T8834] FAT-fs (loop2): Filesystem has been set read-only [ 339.071159][ T8834] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 01:02:49 executing program 1: 01:02:49 executing program 0: 01:02:49 executing program 1: 01:02:49 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") 01:02:49 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:49 executing program 0: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x4000, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000240)={0x9}, 0xc) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x101000, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "b9821c79e7e112f5", "aa183fd7d073f33982f44c76fe0b0948", "149adfd2", "da09dc1392d90ff9"}, 0x28) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x69f, 0x0, 0x4, 0x20, 0xfffffffffffff264, 0xe87, 0x3ff, 0x8, 0xffff, 0xff, 0x8, 0x0, 0x2, 0x9, 0x1, 0x0, 0x0, 0x641, 0x3f, 0xa, 0xffffffffffff6276, 0x0, 0xfffffffffffffff7, 0x4, 0xb89, 0x0, 0x56e, 0x9, 0x0, 0x0, 0x450, 0x0, 0x6, 0x0, @perf_config_ext, 0x2010, 0xb8, 0x7, 0xf, 0xffff, 0x1f}, r2, 0x9, r1, 0x2) perf_event_open$cgroup(0x0, r1, 0xe, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(r3, 0x0, 0x200002, 0x0) 01:02:49 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 339.636897][ T26] audit: type=1800 audit(1576112569.577:49): pid=8860 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=28 res=0 [ 339.758522][ T26] audit: type=1804 audit(1576112569.607:50): pid=8860 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/22/file0/file0" dev="loop2" ino=28 res=1 [ 339.844667][ T8860] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 339.876840][ T26] audit: type=1804 audit(1576112569.697:51): pid=8864 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/22/file0/file0" dev="loop2" ino=28 res=1 [ 339.925082][ T8860] FAT-fs (loop2): Filesystem has been set read-only [ 339.960380][ T8860] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 01:02:50 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x800, 0x4, 0x2}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xaf, 0xc02c0) sendto$inet6(r1, &(0x7f0000000100)="785d0c2ccc1e7aaf0eeee5370ea6fabdfe5207c100ad4ef482fd001f5c13506c1ba67f53c2689aff0b625a94c3fadcab45da6499c0740126dea3ba3f3c8a4320c073ee18f26ec666b7c795d5ac301f8c0cd9681c5ccd198df78a8d9d6892866577a7998b5eb5ce0653fd42c834a25bc420ec2145b5742df8ba60e6c399e8b5b50cc91f37ed686f22b7b9fbba41d664e17b67ab5d0c20410d8ee49bb7937a45be9f4e2c52a9585ef0fef9c74ca41beae63babd6ad2e73538a07951f505cb191bc73f2fde7f5cfca5f2fb29321abcdc815a0283db8668f3eb082f73a", 0xdb, 0x8000, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0xd}, 0x9}, 0x1c) socket$kcm(0x2, 0x200000000000001, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x404000, 0x3) 01:02:50 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0304ffdf000c00e60507ee9a3c00"/28, @ANYRES32=r2], 0x38}}, 0x0) [ 340.300769][ T8875] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 340.335788][ T8879] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 340.536993][ T8871] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.546151][ T8871] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.394866][ T2608] device bridge_slave_1 left promiscuous mode [ 341.401288][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.451444][ T2608] device bridge_slave_0 left promiscuous mode [ 341.461773][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.514390][ T2608] device bridge_slave_1 left promiscuous mode [ 341.520976][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.575083][ T2608] device bridge_slave_0 left promiscuous mode [ 341.585178][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.961053][ T2608] device hsr_slave_0 left promiscuous mode [ 343.010840][ T2608] device hsr_slave_1 left promiscuous mode [ 343.059517][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 343.070570][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 343.081384][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 343.124777][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 343.182815][ T2608] bond0 (unregistering): Released all slaves [ 343.360895][ T2608] device hsr_slave_0 left promiscuous mode [ 343.400860][ T2608] device hsr_slave_1 left promiscuous mode [ 343.446802][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 343.456873][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 343.467132][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 343.524970][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 343.581851][ T2608] bond0 (unregistering): Released all slaves [ 343.709632][ T8885] IPVS: ftp: loaded support on port[0] = 21 [ 343.709692][ T8887] IPVS: ftp: loaded support on port[0] = 21 [ 343.796096][ T8885] chnl_net:caif_netlink_parms(): no params data found [ 343.839279][ T8885] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.846461][ T8885] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.854713][ T8885] device bridge_slave_0 entered promiscuous mode [ 343.864220][ T8885] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.871350][ T8885] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.879229][ T8885] device bridge_slave_1 entered promiscuous mode [ 343.896941][ T8887] chnl_net:caif_netlink_parms(): no params data found [ 343.910280][ T8885] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 343.945023][ T8885] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 344.023917][ T8885] team0: Port device team_slave_0 added [ 344.030562][ T8885] team0: Port device team_slave_1 added [ 344.041395][ T8887] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.048623][ T8887] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.056921][ T8887] device bridge_slave_0 entered promiscuous mode [ 344.076312][ T8887] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.083808][ T8887] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.092280][ T8887] device bridge_slave_1 entered promiscuous mode [ 344.146344][ T8885] device hsr_slave_0 entered promiscuous mode [ 344.191158][ T8885] device hsr_slave_1 entered promiscuous mode [ 344.243669][ T8885] debugfs: Directory 'hsr0' with parent '/' already present! [ 344.296997][ T8887] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 344.313713][ T8885] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.320837][ T8885] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.328110][ T8885] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.335270][ T8885] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.350009][ T8887] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 344.389160][ T8887] team0: Port device team_slave_0 added [ 344.396081][ T8887] team0: Port device team_slave_1 added [ 344.483379][ T8887] device hsr_slave_0 entered promiscuous mode [ 344.511150][ T8887] device hsr_slave_1 entered promiscuous mode [ 344.570773][ T8887] debugfs: Directory 'hsr0' with parent '/' already present! [ 344.587849][ T8887] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.594969][ T8887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.602580][ T8887] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.610070][ T8887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.644627][ T8885] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.659830][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.668182][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.681224][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.691558][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.699219][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.714155][ T8885] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.735716][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 344.747624][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.757227][ T8033] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.764288][ T8033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.780449][ T8887] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.793564][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.802508][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.811357][ T3515] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.818414][ T3515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.841557][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 344.851594][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.859730][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.868073][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 344.877824][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 344.887700][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 344.897214][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 344.906435][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 344.915388][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 344.923905][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 344.932904][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 344.944445][ T8885] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 344.956760][ T8885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 344.966483][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 344.975253][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 344.985316][ T8887] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.999210][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 345.009153][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.018223][ T3017] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.025357][ T3017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.038774][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.048483][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.057271][ T8033] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.064573][ T8033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.078257][ T8885] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.090838][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 345.098561][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 345.121891][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 345.131259][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 345.153078][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 345.165051][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 345.174863][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 345.183991][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 345.192970][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.201374][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.209955][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 345.224829][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.233812][ T7895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.249026][ T8887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 345.265206][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 345.273413][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 345.368556][ T26] audit: type=1804 audit(1576112575.307:52): pid=8898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 [ 345.402271][ T8887] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 345.441668][ T26] audit: type=1804 audit(1576112575.387:53): pid=8903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 [ 345.507055][ T26] audit: type=1804 audit(1576112575.407:54): pid=8903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 [ 345.549251][ T26] audit: type=1804 audit(1576112575.407:55): pid=8903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 [ 345.581151][ T26] audit: type=1804 audit(1576112575.487:56): pid=8906 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 [ 345.626332][ T26] audit: type=1804 audit(1576112575.487:57): pid=8906 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 [ 345.840503][ T8911] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.848908][ T8911] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.115433][ T26] audit: type=1804 audit(1576112576.057:58): pid=8903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 [ 346.161746][ T26] audit: type=1804 audit(1576112576.087:59): pid=8903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 [ 346.187362][ T26] audit: type=1804 audit(1576112576.087:60): pid=8906 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 01:02:56 executing program 4: creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000300)={0x30, 0x5, 0x0, {0x0, 0x3, 0x8, 0x8}}, 0x30) creat(&(0x7f0000000140)='./bus\x00', 0x0) r5 = socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x200080}, 0xc) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000480)={0x7, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}]}) r8 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x8000fffffffe) ioctl$RTC_ALM_READ(r8, 0x80247008, &(0x7f0000000080)) 01:02:56 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") [ 346.235078][ T26] audit: type=1804 audit(1576112576.087:61): pid=8906 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/0/bus" dev="sda1" ino=16683 res=1 01:02:56 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") 01:02:56 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x800, 0x4, 0x2}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xaf, 0xc02c0) sendto$inet6(r1, &(0x7f0000000100)="785d0c2ccc1e7aaf0eeee5370ea6fabdfe5207c100ad4ef482fd001f5c13506c1ba67f53c2689aff0b625a94c3fadcab45da6499c0740126dea3ba3f3c8a4320c073ee18f26ec666b7c795d5ac301f8c0cd9681c5ccd198df78a8d9d6892866577a7998b5eb5ce0653fd42c834a25bc420ec2145b5742df8ba60e6c399e8b5b50cc91f37ed686f22b7b9fbba41d664e17b67ab5d0c20410d8ee49bb7937a45be9f4e2c52a9585ef0fef9c74ca41beae63babd6ad2e73538a07951f505cb191bc73f2fde7f5cfca5f2fb29321abcdc815a0283db8668f3eb082f73a", 0xdb, 0x8000, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0xd}, 0x9}, 0x1c) socket$kcm(0x2, 0x200000000000001, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x404000, 0x3) 01:02:56 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:56 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 346.594798][ T8916] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 346.664787][ T8916] FAT-fs (loop2): Filesystem has been set read-only [ 346.687812][ T8918] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 346.701921][ T8916] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 01:02:56 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 346.718786][ T8918] FAT-fs (loop0): Filesystem has been set read-only [ 346.751074][ T8918] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 01:02:56 executing program 4: creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42800) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='./bus\x00', &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r4 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000300)={0x30, 0x5, 0x0, {0x0, 0x3, 0x8, 0x8}}, 0x30) creat(&(0x7f0000000140)='./bus\x00', 0x0) r5 = socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x200080}, 0xc) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f0000000480)={0x7, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}]}) r8 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x8000fffffffe) ioctl$RTC_ALM_READ(r8, 0x80247008, &(0x7f0000000080)) 01:02:56 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:02:56 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:02:56 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") 01:02:56 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 347.340931][ T8945] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 347.390767][ T8945] FAT-fs (loop2): Filesystem has been set read-only [ 347.413377][ T8945] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 01:02:57 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 347.538490][ T2608] device bridge_slave_1 left promiscuous mode [ 347.549211][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.612808][ T2608] device bridge_slave_0 left promiscuous mode [ 347.623015][ T8951] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 347.632365][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state 01:02:57 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) [ 347.700705][ T8951] FAT-fs (loop0): Filesystem has been set read-only [ 347.722087][ T8951] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) 01:02:57 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) fanotify_init(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x800, 0x4, 0x2}) r1 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xaf, 0xc02c0) sendto$inet6(r1, &(0x7f0000000100)="785d0c2ccc1e7aaf0eeee5370ea6fabdfe5207c100ad4ef482fd001f5c13506c1ba67f53c2689aff0b625a94c3fadcab45da6499c0740126dea3ba3f3c8a4320c073ee18f26ec666b7c795d5ac301f8c0cd9681c5ccd198df78a8d9d6892866577a7998b5eb5ce0653fd42c834a25bc420ec2145b5742df8ba60e6c399e8b5b50cc91f37ed686f22b7b9fbba41d664e17b67ab5d0c20410d8ee49bb7937a45be9f4e2c52a9585ef0fef9c74ca41beae63babd6ad2e73538a07951f505cb191bc73f2fde7f5cfca5f2fb29321abcdc815a0283db8668f3eb082f73a", 0xdb, 0x8000, &(0x7f0000000200)={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0xd}, 0x9}, 0x1c) socket$kcm(0x2, 0x200000000000001, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x404000, 0x3) 01:02:58 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) [ 348.284087][ T8967] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 348.353951][ T8967] FAT-fs (loop4): Filesystem has been set read-only [ 348.386417][ T8967] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) 01:02:58 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) ioctl$sock_netdev_private(r1, 0x89fa, &(0x7f0000000380)="ef64a2ee353a4fe8abe3c17e8da50cde854f5dd1ef64a1f2b026b13e8c4268641617efa813c65bce54b2ef2a") 01:02:58 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 349.203980][ T8989] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 349.259774][ T8985] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 349.286647][ T8989] FAT-fs (loop2): Filesystem has been set read-only 01:02:59 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) [ 349.314896][ T8985] FAT-fs (loop4): Filesystem has been set read-only [ 349.320998][ T8989] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 349.338208][ T8985] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) 01:02:59 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) [ 349.773164][ T8999] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 349.842673][ T8999] FAT-fs (loop0): Filesystem has been set read-only [ 349.874541][ T8999] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 350.140964][ T2608] device hsr_slave_0 left promiscuous mode [ 350.180838][ T2608] device hsr_slave_1 left promiscuous mode [ 350.237261][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 350.248693][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 350.260109][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 350.305533][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 350.412138][ T2608] bond0 (unregistering): Released all slaves 01:03:00 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:00 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:00 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 350.584693][ T9016] IPVS: ftp: loaded support on port[0] = 21 [ 350.652289][ T26] kauditd_printk_skb: 48 callbacks suppressed [ 350.652307][ T26] audit: type=1800 audit(1576112580.597:110): pid=9019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=40 res=0 [ 350.713091][ T26] audit: type=1804 audit(1576112580.647:111): pid=9019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/5/file0/file0" dev="loop4" ino=40 res=1 [ 350.746565][ T26] audit: type=1800 audit(1576112580.677:112): pid=9022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=41 res=0 [ 350.767180][ T26] audit: type=1804 audit(1576112580.697:113): pid=9022 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir035652892/syzkaller.6Q8z6K/29/file0/file0" dev="loop3" ino=41 res=1 [ 350.812954][ T9016] chnl_net:caif_netlink_parms(): no params data found [ 350.855234][ T26] audit: type=1804 audit(1576112580.797:114): pid=9029 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir035652892/syzkaller.6Q8z6K/29/file0/file0" dev="loop3" ino=41 res=1 [ 350.902097][ T9019] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 350.913797][ T9022] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 350.923079][ T26] audit: type=1804 audit(1576112580.827:115): pid=9026 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir846567338/syzkaller.coaRDJ/5/file0/file0" dev="loop4" ino=40 res=1 [ 350.945027][ T9016] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.947800][ T9019] FAT-fs (loop4): Filesystem has been set read-only [ 350.961844][ T9022] FAT-fs (loop3): Filesystem has been set read-only [ 350.968859][ T9022] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 350.978381][ T9019] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 350.978501][ T9016] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.987972][ T9029] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 351.019191][ T9016] device bridge_slave_0 entered promiscuous mode [ 351.027058][ T9016] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.035133][ T9016] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.052099][ T9016] device bridge_slave_1 entered promiscuous mode [ 351.085089][ T9016] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 351.110252][ T9016] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 351.141882][ T9016] team0: Port device team_slave_0 added [ 351.148738][ T9016] team0: Port device team_slave_1 added [ 351.223478][ T9016] device hsr_slave_0 entered promiscuous mode [ 351.281064][ T9016] device hsr_slave_1 entered promiscuous mode [ 351.319725][ T9016] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.326917][ T9016] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.334300][ T9016] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.341333][ T9016] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.386001][ T9016] 8021q: adding VLAN 0 to HW filter on device bond0 [ 351.400973][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 351.409822][ T3515] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.421635][ T3515] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.438881][ T9016] 8021q: adding VLAN 0 to HW filter on device team0 [ 351.449966][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 351.463217][ T3515] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.470359][ T3515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.482804][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 351.494923][ T3017] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.501992][ T3017] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.523181][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 351.532608][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 351.542839][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.558714][ T9016] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 351.570106][ T9016] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 351.578970][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 351.587803][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.605701][ T9016] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 351.614930][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 351.622921][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 351.765465][ T9041] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.775520][ T9041] bridge0: port 1(bridge_slave_0) entered disabled state 01:03:02 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:02 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:02 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:02 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:02 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:02 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) [ 352.286523][ T26] audit: type=1800 audit(1576112582.227:116): pid=9057 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16726 res=0 [ 352.363727][ T26] audit: type=1800 audit(1576112582.257:117): pid=9059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16727 res=0 [ 352.569261][ T26] audit: type=1804 audit(1576112582.287:118): pid=9062 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/28/file0/file0" dev="sda1" ino=16728 res=1 [ 352.721775][ T26] audit: type=1804 audit(1576112582.287:119): pid=9060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/28/file0/file0" dev="sda1" ino=16728 res=1 01:03:03 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:03 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:03 executing program 3: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:03 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) 01:03:03 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:03 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 353.837468][ T9078] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.845935][ T9078] bridge0: port 1(bridge_slave_0) entered disabled state 01:03:04 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) 01:03:04 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) [ 354.316090][ T9074] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.323388][ T9074] bridge0: port 1(bridge_slave_0) entered disabled state 01:03:04 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 355.579712][ T9110] IPVS: ftp: loaded support on port[0] = 21 [ 355.734147][ T9110] chnl_net:caif_netlink_parms(): no params data found [ 355.760127][ T2608] device bridge_slave_1 left promiscuous mode [ 355.769757][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.821581][ T2608] device bridge_slave_0 left promiscuous mode [ 355.827860][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.902111][ T2608] device bridge_slave_1 left promiscuous mode [ 355.908396][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.971584][ T2608] device bridge_slave_0 left promiscuous mode [ 355.977875][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.251061][ T2608] device hsr_slave_0 left promiscuous mode [ 357.294239][ T2608] device hsr_slave_1 left promiscuous mode [ 357.378027][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 357.388792][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 357.399769][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 357.454670][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 357.531609][ T2608] bond0 (unregistering): Released all slaves [ 357.711088][ T2608] device hsr_slave_0 left promiscuous mode [ 357.771105][ T2608] device hsr_slave_1 left promiscuous mode [ 357.818266][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 357.828988][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 357.839408][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 357.894943][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 357.971290][ T2608] bond0 (unregistering): Released all slaves [ 358.083483][ T9110] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.090739][ T9110] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.098342][ T9110] device bridge_slave_0 entered promiscuous mode [ 358.106780][ T9110] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.114384][ T9110] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.122599][ T9110] device bridge_slave_1 entered promiscuous mode [ 358.140468][ T9110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 358.155142][ T9110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.155530][ T9114] IPVS: ftp: loaded support on port[0] = 21 [ 358.182835][ T9110] team0: Port device team_slave_0 added [ 358.190900][ T9110] team0: Port device team_slave_1 added [ 358.263311][ T9110] device hsr_slave_0 entered promiscuous mode [ 358.301214][ T9110] device hsr_slave_1 entered promiscuous mode [ 358.370822][ T9110] debugfs: Directory 'hsr0' with parent '/' already present! [ 358.439034][ T9114] chnl_net:caif_netlink_parms(): no params data found [ 358.591966][ T9114] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.599052][ T9114] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.610524][ T9114] device bridge_slave_0 entered promiscuous mode [ 358.618581][ T9114] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.629451][ T9114] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.637534][ T9114] device bridge_slave_1 entered promiscuous mode [ 358.655637][ T9110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 358.669249][ T9114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 358.683258][ T9114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.704986][ T9110] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.718072][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 358.734680][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 358.742629][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 358.751147][ T9114] team0: Port device team_slave_0 added [ 358.758120][ T9114] team0: Port device team_slave_1 added [ 358.777843][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 358.801379][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 358.809749][ T3515] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.816887][ T3515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 358.824800][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 358.833712][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 358.842431][ T3515] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.849466][ T3515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 358.858396][ T3515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 358.871809][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.942759][ T9114] device hsr_slave_0 entered promiscuous mode [ 358.990961][ T9114] device hsr_slave_1 entered promiscuous mode [ 359.030739][ T9114] debugfs: Directory 'hsr0' with parent '/' already present! [ 359.039392][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 359.051112][ T7755] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 359.065326][ T9110] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 359.076080][ T9110] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 359.089268][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.102029][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.110446][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 359.132083][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 359.139576][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 359.157229][ T9110] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 359.202661][ T9114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 359.219470][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 359.228088][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 359.241842][ T9114] 8021q: adding VLAN 0 to HW filter on device team0 [ 359.258979][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 359.271529][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.280207][ T9116] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.287296][ T9116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 359.310886][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 359.318664][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 359.327265][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 359.336233][ T9116] bridge0: port 2(bridge_slave_1) entered blocking state [ 359.343292][ T9116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 359.365596][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 359.381922][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 359.398083][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 359.406700][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 359.415781][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 359.424820][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 359.435814][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 359.444070][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 359.453236][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 359.469442][ T9114] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 359.485035][ T9114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 359.500760][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 359.509372][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 359.528247][ T9114] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 359.539625][ T9126] bridge0: port 2(bridge_slave_1) entered disabled state [ 359.548014][ T9126] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.784779][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 359.793912][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 01:03:09 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:09 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) 01:03:09 executing program 3: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:09 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:09 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) [ 360.085941][ T26] kauditd_printk_skb: 15 callbacks suppressed [ 360.085957][ T26] audit: type=1800 audit(1576112590.027:135): pid=9143 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=47 res=0 [ 360.126433][ T26] audit: type=1800 audit(1576112590.027:136): pid=9141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=48 res=0 [ 360.153188][ T26] audit: type=1804 audit(1576112590.047:137): pid=9141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/31/file0/file0" dev="loop2" ino=48 res=1 01:03:10 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) [ 360.258784][ T26] audit: type=1804 audit(1576112590.067:138): pid=9143 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir721904851/syzkaller.PJRgED/24/file0/file0" dev="loop0" ino=47 res=1 [ 360.284205][ T26] audit: type=1804 audit(1576112590.127:139): pid=9141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/31/file0/file0" dev="loop2" ino=48 res=1 [ 360.315977][ T26] audit: type=1804 audit(1576112590.187:140): pid=9152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir721904851/syzkaller.PJRgED/24/file0/file0" dev="loop0" ino=47 res=1 [ 360.404606][ T9135] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.414330][ T9135] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.680088][ T26] audit: type=1800 audit(1576112590.617:141): pid=9156 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=49 res=0 [ 360.720213][ T26] audit: type=1804 audit(1576112590.637:142): pid=9159 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/32/file0/file0" dev="loop2" ino=49 res=1 01:03:10 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 360.797261][ T26] audit: type=1804 audit(1576112590.707:143): pid=9156 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/32/file0/file0" dev="loop2" ino=49 res=1 01:03:10 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:10 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:10 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:11 executing program 3: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:11 executing program 4: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:11 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) [ 361.157484][ T26] audit: type=1800 audit(1576112591.097:144): pid=9163 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=50 res=0 01:03:11 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:11 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:11 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) 01:03:11 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) 01:03:11 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:12 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:12 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 362.533833][ T9199] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 362.552988][ T9199] FAT-fs (loop0): Filesystem has been set read-only [ 362.569646][ T9199] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 01:03:12 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) 01:03:12 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:12 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:12 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) [ 363.055900][ T2608] device bridge_slave_1 left promiscuous mode [ 363.069923][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.172533][ T2608] device bridge_slave_0 left promiscuous mode [ 363.179695][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.238279][ T9215] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 363.269556][ T9215] FAT-fs (loop2): Filesystem has been set read-only [ 363.305212][ T9215] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 364.521087][ T2608] device hsr_slave_0 left promiscuous mode [ 364.591003][ T2608] device hsr_slave_1 left promiscuous mode [ 364.637909][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 364.649285][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 364.662007][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 364.724648][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 364.792292][ T2608] bond0 (unregistering): Released all slaves [ 364.887935][ T9225] IPVS: ftp: loaded support on port[0] = 21 [ 364.938960][ T9225] chnl_net:caif_netlink_parms(): no params data found [ 364.964561][ T9225] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.972462][ T9225] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.980910][ T9225] device bridge_slave_0 entered promiscuous mode [ 364.988771][ T9225] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.996349][ T9225] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.005287][ T9225] device bridge_slave_1 entered promiscuous mode [ 365.094396][ T9225] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 365.105560][ T9225] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 365.128181][ T9225] team0: Port device team_slave_0 added [ 365.140016][ T9225] team0: Port device team_slave_1 added [ 365.225984][ T9225] device hsr_slave_0 entered promiscuous mode [ 365.301077][ T9225] device hsr_slave_1 entered promiscuous mode [ 365.351518][ T9225] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.358594][ T9225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.366252][ T9225] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.373439][ T9225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 365.416660][ T9225] 8021q: adding VLAN 0 to HW filter on device bond0 [ 365.453876][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 365.463432][ T8033] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.478599][ T8033] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.502969][ T9225] 8021q: adding VLAN 0 to HW filter on device team0 [ 365.515998][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 365.531319][ T8033] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.538373][ T8033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 365.566859][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 365.591223][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.599587][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.615780][ T9229] IPVS: ftp: loaded support on port[0] = 21 [ 365.620041][ T9225] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 365.636774][ T9225] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 365.656729][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 365.681813][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 365.690886][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 365.700102][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 365.709507][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 365.717086][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 365.736240][ T9225] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 365.738553][ T9230] IPVS: ftp: loaded support on port[0] = 21 [ 365.747270][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 365.756722][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 365.931596][ T9230] chnl_net:caif_netlink_parms(): no params data found [ 365.972580][ T9229] chnl_net:caif_netlink_parms(): no params data found [ 366.008656][ T26] kauditd_printk_skb: 23 callbacks suppressed [ 366.008676][ T26] audit: type=1800 audit(1576112595.947:168): pid=9241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=56 res=0 [ 366.016135][ T9230] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.043703][ T9230] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.055108][ T9230] device bridge_slave_0 entered promiscuous mode [ 366.066476][ T26] audit: type=1804 audit(1576112595.997:169): pid=9241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir681202117/syzkaller.u1Il5y/0/file0/file0" dev="loop1" ino=56 res=1 [ 366.074970][ T9230] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.099785][ T9230] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.108611][ T9230] device bridge_slave_1 entered promiscuous mode [ 366.325910][ T9229] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.333807][ T9229] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.342725][ T9229] device bridge_slave_0 entered promiscuous mode [ 366.355281][ T9229] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.362619][ T9229] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.371261][ T9229] device bridge_slave_1 entered promiscuous mode [ 366.486305][ T9230] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 366.504126][ T9229] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 366.515611][ T9230] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 366.625517][ T9229] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 366.653863][ T9230] team0: Port device team_slave_0 added [ 366.666723][ T9229] team0: Port device team_slave_0 added [ 366.783544][ T9230] team0: Port device team_slave_1 added [ 366.790252][ T9229] team0: Port device team_slave_1 added 01:03:16 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:16 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:16 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:16 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) [ 366.865253][ T9229] device hsr_slave_0 entered promiscuous mode [ 366.909912][ T26] audit: type=1800 audit(1576112596.847:170): pid=9248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=57 res=0 [ 366.951013][ T9229] device hsr_slave_1 entered promiscuous mode [ 366.978981][ T26] audit: type=1804 audit(1576112596.887:171): pid=9248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/37/file0/file0" dev="loop2" ino=57 res=1 [ 367.018706][ T26] audit: type=1804 audit(1576112596.957:172): pid=9257 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/37/file0/file0" dev="loop2" ino=57 res=1 [ 367.025432][ T9248] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 367.050502][ T9229] debugfs: Directory 'hsr0' with parent '/' already present! [ 367.080532][ T9248] FAT-fs (loop2): Filesystem has been set read-only [ 367.100064][ T9248] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 367.127767][ T26] audit: type=1800 audit(1576112597.007:173): pid=9259 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16774 res=0 [ 367.180291][ T9230] device hsr_slave_0 entered promiscuous mode [ 367.208030][ T26] audit: type=1804 audit(1576112597.017:174): pid=9259 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir721904851/syzkaller.PJRgED/28/file0/file0" dev="sda1" ino=16774 res=1 [ 367.251089][ T9230] device hsr_slave_1 entered promiscuous mode [ 367.253505][ T26] audit: type=1800 audit(1576112597.017:175): pid=9258 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=58 res=0 [ 367.320664][ T9230] debugfs: Directory 'hsr0' with parent '/' already present! [ 367.448508][ T26] audit: type=1804 audit(1576112597.187:176): pid=9251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir035652892/syzkaller.6Q8z6K/35/file0/file0" dev="loop3" ino=58 res=1 [ 367.452557][ T9251] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 01:03:17 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 367.557489][ T9263] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 367.565058][ T9251] FAT-fs (loop3): Filesystem has been set read-only [ 367.591214][ T9263] FAT-fs (loop1): Filesystem has been set read-only [ 367.597943][ T9251] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 367.617020][ T26] audit: type=1800 audit(1576112597.247:177): pid=9263 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=59 res=0 [ 367.622524][ T9263] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 368.145480][ T9229] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.161772][ T9230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.286519][ T9229] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.300377][ T9230] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.308442][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.317970][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.331159][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 368.339857][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 368.462715][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.474704][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.485904][ T8890] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.493054][ T8890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.508641][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 368.517474][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 368.531374][ T8890] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.538677][ T8890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 368.571490][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.580845][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.589402][ T8890] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.596719][ T8890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.606317][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 368.615465][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 368.623948][ T8890] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.631273][ T8890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 368.640138][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 368.649506][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 368.658798][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 368.667911][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 368.677746][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 368.685904][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 368.697250][ T2608] device bridge_slave_1 left promiscuous mode [ 368.707584][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.771819][ T2608] device bridge_slave_0 left promiscuous mode [ 368.778067][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.832341][ T2608] device bridge_slave_1 left promiscuous mode [ 368.838949][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.871604][ T2608] device bridge_slave_0 left promiscuous mode [ 368.877967][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.912106][ T2608] device bridge_slave_1 left promiscuous mode [ 368.919179][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.981343][ T2608] device bridge_slave_0 left promiscuous mode [ 368.989015][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.831067][ T2608] device hsr_slave_0 left promiscuous mode [ 370.890950][ T2608] device hsr_slave_1 left promiscuous mode [ 370.947356][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 370.958615][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 370.969770][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 371.024636][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 371.105370][ T2608] bond0 (unregistering): Released all slaves [ 371.241026][ T2608] device hsr_slave_0 left promiscuous mode [ 371.280793][ T2608] device hsr_slave_1 left promiscuous mode [ 371.327362][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 371.338094][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 371.349839][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 371.395521][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 371.503131][ T2608] bond0 (unregistering): Released all slaves [ 371.671328][ T2608] device hsr_slave_0 left promiscuous mode [ 371.730887][ T2608] device hsr_slave_1 left promiscuous mode [ 371.807692][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 371.818196][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 371.828358][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 371.884296][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 371.961337][ T2608] bond0 (unregistering): Released all slaves [ 372.068217][ T9229] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 372.079149][ T9229] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 372.090906][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 372.099464][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 372.108306][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 372.116870][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 372.125779][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 372.134297][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.143489][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 372.152136][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.160909][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 372.169270][ T8890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 372.187470][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 372.195290][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 372.202880][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 372.211818][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 372.223246][ T9229] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 372.234315][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 372.242728][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 372.252151][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 372.267289][ T9230] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 372.278858][ T9230] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 372.295682][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 372.310012][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 372.319393][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 372.328316][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 372.338199][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 372.352503][ T9230] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 372.360427][ T9117] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 372.368538][ T9117] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 372.495538][ T26] kauditd_printk_skb: 6 callbacks suppressed [ 372.495553][ T26] audit: type=1800 audit(1576112602.437:184): pid=9295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=61 res=0 [ 372.522509][ T26] audit: type=1804 audit(1576112602.447:185): pid=9295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir220159584/syzkaller.o5IERz/0/file0/file0" dev="loop4" ino=61 res=1 [ 372.677980][ T26] audit: type=1804 audit(1576112602.617:186): pid=9295 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir220159584/syzkaller.o5IERz/0/file0/file0" dev="loop4" ino=61 res=1 [ 372.734091][ T9303] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.741783][ T9303] bridge0: port 1(bridge_slave_0) entered disabled state 01:03:23 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:23 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:23 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:23 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:23 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:23 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 373.306250][ T26] audit: type=1800 audit(1576112603.247:187): pid=9314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=62 res=0 [ 373.417318][ T26] audit: type=1804 audit(1576112603.247:188): pid=9314 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir721904851/syzkaller.PJRgED/29/file0/file0" dev="loop0" ino=62 res=1 [ 373.596189][ T9310] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 373.626814][ T26] audit: type=1800 audit(1576112603.267:189): pid=9310 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=63 res=0 [ 373.638764][ T9310] FAT-fs (loop1): Filesystem has been set read-only [ 373.709049][ T9310] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) 01:03:23 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 373.789855][ T26] audit: type=1800 audit(1576112603.307:190): pid=9313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16805 res=0 01:03:23 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 373.920688][ T26] audit: type=1800 audit(1576112603.317:191): pid=9317 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=64 res=0 01:03:23 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240), 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(0xffffffffffffffff, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:24 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) [ 374.074731][ T26] audit: type=1804 audit(1576112603.327:192): pid=9313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/39/file0/file0" dev="sda1" ino=16805 res=1 01:03:24 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:24 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:24 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 374.321852][ T26] audit: type=1804 audit(1576112603.357:193): pid=9310 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir681202117/syzkaller.u1Il5y/2/file0/file0" dev="loop1" ino=63 res=1 [ 374.514846][ T9338] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.522906][ T9338] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.098237][ T9353] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 01:03:25 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) [ 375.178142][ T9353] FAT-fs (loop3): Filesystem has been set read-only [ 375.211242][ T9353] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 01:03:25 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:25 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:25 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:25 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:25 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:26 executing program 1: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 377.254318][ T2608] device bridge_slave_1 left promiscuous mode [ 377.270767][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.301294][ T2608] device bridge_slave_0 left promiscuous mode [ 377.307649][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.261316][ T2608] device hsr_slave_0 left promiscuous mode [ 378.310799][ T2608] device hsr_slave_1 left promiscuous mode [ 378.357485][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 378.368605][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 378.379234][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 378.444494][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 378.511006][ T2608] bond0 (unregistering): Released all slaves [ 378.677929][ T9400] IPVS: ftp: loaded support on port[0] = 21 [ 378.731252][ T9400] chnl_net:caif_netlink_parms(): no params data found [ 378.756821][ T9400] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.764201][ T9400] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.771881][ T9400] device bridge_slave_0 entered promiscuous mode [ 378.779258][ T9400] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.786444][ T9400] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.794171][ T9400] device bridge_slave_1 entered promiscuous mode [ 378.865412][ T9400] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 378.876521][ T9400] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 378.899660][ T9400] team0: Port device team_slave_0 added [ 378.909255][ T9400] team0: Port device team_slave_1 added [ 378.973010][ T9400] device hsr_slave_0 entered promiscuous mode [ 379.010998][ T9400] device hsr_slave_1 entered promiscuous mode [ 379.100668][ T9400] debugfs: Directory 'hsr0' with parent '/' already present! [ 379.113501][ T9403] IPVS: ftp: loaded support on port[0] = 21 [ 379.118935][ T9400] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.126472][ T9400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.133769][ T9400] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.140804][ T9400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.233136][ T9400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 379.250319][ T9403] chnl_net:caif_netlink_parms(): no params data found [ 379.265409][ T9400] 8021q: adding VLAN 0 to HW filter on device team0 [ 379.273876][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 379.282352][ T7779] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.290190][ T7779] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.333795][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 379.342345][ T7779] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.349477][ T7779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.357748][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 379.366211][ T7779] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.373288][ T7779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.386667][ T9403] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.394697][ T9403] bridge0: port 1(bridge_slave_0) entered disabled state [ 379.402788][ T9403] device bridge_slave_0 entered promiscuous mode [ 379.410833][ T9403] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.417888][ T9403] bridge0: port 2(bridge_slave_1) entered disabled state [ 379.426128][ T9403] device bridge_slave_1 entered promiscuous mode [ 379.450878][ T9403] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 379.466869][ T9403] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 379.477233][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 379.498008][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 379.506268][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 379.515498][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 379.524241][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 379.537994][ T9403] team0: Port device team_slave_0 added [ 379.547645][ T9403] team0: Port device team_slave_1 added [ 379.555126][ T9400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 379.622925][ T9403] device hsr_slave_0 entered promiscuous mode [ 379.671158][ T9403] device hsr_slave_1 entered promiscuous mode [ 379.710764][ T9403] debugfs: Directory 'hsr0' with parent '/' already present! [ 379.718660][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 379.726479][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 379.739692][ T9400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 379.789932][ T9403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 379.803867][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 379.812747][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 379.824272][ T9403] 8021q: adding VLAN 0 to HW filter on device team0 [ 379.840565][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 379.849859][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 379.874585][ T7779] bridge0: port 1(bridge_slave_0) entered blocking state [ 379.881726][ T7779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 379.891425][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 379.900457][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 379.917646][ T7779] bridge0: port 2(bridge_slave_1) entered blocking state [ 379.924790][ T7779] bridge0: port 2(bridge_slave_1) entered forwarding state [ 379.933452][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 379.942855][ T7779] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 379.967616][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 379.977641][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 379.987172][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 379.996722][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 380.005751][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 380.015849][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 380.024899][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 380.033887][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 380.043414][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 380.052478][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 380.063773][ T9403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 380.073846][ T9413] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.081897][ T9413] bridge0: port 1(bridge_slave_0) entered disabled state 01:03:30 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240), 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(0xffffffffffffffff, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:30 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:30 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:30 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:30 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 380.370816][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 380.385097][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 380.434938][ T9403] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 380.507845][ T26] kauditd_printk_skb: 32 callbacks suppressed [ 380.507864][ T26] audit: type=1800 audit(1576112610.447:226): pid=9419 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=71 res=0 [ 380.645180][ T26] audit: type=1800 audit(1576112610.457:227): pid=9422 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=72 res=0 [ 380.685145][ T9419] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) 01:03:30 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) [ 380.698477][ T26] audit: type=1804 audit(1576112610.457:228): pid=9422 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir721904851/syzkaller.PJRgED/33/file0/file0" dev="loop0" ino=72 res=1 [ 380.705208][ T9419] FAT-fs (loop2): Filesystem has been set read-only [ 380.766731][ T26] audit: type=1804 audit(1576112610.507:229): pid=9433 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir220159584/syzkaller.o5IERz/4/file0/file0" dev="loop4" ino=73 res=1 [ 380.819076][ T9419] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 380.850942][ T26] audit: type=1804 audit(1576112610.507:230): pid=9434 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/42/file0/file0" dev="loop2" ino=71 res=1 [ 380.905060][ T9434] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 380.968119][ T26] audit: type=1804 audit(1576112610.537:231): pid=9416 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir220159584/syzkaller.o5IERz/4/file0/file0" dev="loop4" ino=73 res=1 [ 381.049585][ T26] audit: type=1804 audit(1576112610.557:232): pid=9422 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir721904851/syzkaller.PJRgED/33/file0/file0" dev="loop0" ino=72 res=1 01:03:31 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7fffffa7) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) [ 381.102171][ T26] audit: type=1804 audit(1576112610.607:233): pid=9434 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/42/file0/file0" dev="loop2" ino=71 res=1 [ 381.127409][ T26] audit: type=1800 audit(1576112610.617:234): pid=9427 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=74 res=0 [ 381.153789][ T26] audit: type=1804 audit(1576112610.677:235): pid=9427 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir035652892/syzkaller.6Q8z6K/39/file0/file0" dev="loop3" ino=74 res=1 01:03:31 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240), 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(0xffffffffffffffff, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 381.215786][ T9439] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 381.254743][ T9439] FAT-fs (loop0): Filesystem has been set read-only [ 381.274181][ T9439] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) 01:03:31 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:31 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:31 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) r3 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r3, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 381.895679][ T9454] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.905971][ T9454] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.954603][ T9462] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 381.998827][ T9462] FAT-fs (loop0): Filesystem has been set read-only [ 382.023919][ T9462] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17) 01:03:32 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:32 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7fffffa7) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) 01:03:32 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:32 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:32 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:32 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7fffffa7) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) [ 383.041268][ T9478] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 383.113482][ T9478] FAT-fs (loop4): Filesystem has been set read-only [ 383.161538][ T9478] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 383.177989][ T9489] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 383.219446][ T9489] FAT-fs (loop1): Filesystem has been set read-only [ 383.241390][ T2608] device bridge_slave_1 left promiscuous mode [ 383.263280][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.281233][ T9489] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 383.301083][ T9492] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 383.351429][ T2608] device bridge_slave_0 left promiscuous mode [ 383.361156][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state 01:03:33 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r5}) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r6, 0x0, 0x7fffffa7) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) 01:03:33 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:33 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:33 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:34 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 384.134441][ T9513] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 384.206949][ T9513] FAT-fs (loop2): Filesystem has been set read-only [ 384.277067][ T9522] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 384.277656][ T9511] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 384.299177][ T9513] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 384.312389][ T9520] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 384.325951][ T9527] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 384.336383][ T9522] FAT-fs (loop0): Filesystem has been set read-only [ 384.342437][ T9511] FAT-fs (loop4): Filesystem has been set read-only [ 384.348748][ T9520] FAT-fs (loop1): Filesystem has been set read-only [ 384.362789][ T9522] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 384.376485][ T9520] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 384.389237][ T9511] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 385.271316][ T2608] device hsr_slave_0 left promiscuous mode [ 385.320872][ T2608] device hsr_slave_1 left promiscuous mode [ 385.388786][ T2608] team0 (unregistering): Port device team_slave_1 removed [ 385.399875][ T2608] team0 (unregistering): Port device team_slave_0 removed [ 385.411349][ T2608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 385.474684][ T2608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 385.562636][ T2608] bond0 (unregistering): Released all slaves [ 385.718124][ T9541] IPVS: ftp: loaded support on port[0] = 21 [ 385.767672][ T9541] chnl_net:caif_netlink_parms(): no params data found [ 385.794614][ T9541] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.801796][ T9541] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.809707][ T9541] device bridge_slave_0 entered promiscuous mode [ 385.817257][ T9541] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.824395][ T9541] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.832173][ T9541] device bridge_slave_1 entered promiscuous mode [ 385.902892][ T9541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 385.916674][ T9541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 385.936681][ T9541] team0: Port device team_slave_0 added [ 385.946973][ T9541] team0: Port device team_slave_1 added [ 386.023114][ T9541] device hsr_slave_0 entered promiscuous mode [ 386.071019][ T9541] device hsr_slave_1 entered promiscuous mode [ 386.141376][ T9541] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.148567][ T9541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 386.156042][ T9541] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.163079][ T9541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 386.204668][ T9541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 386.217843][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 386.230145][ T8033] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.238684][ T8033] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.255805][ T9541] 8021q: adding VLAN 0 to HW filter on device team0 [ 386.268009][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 386.276532][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.283888][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 386.302729][ T9116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 386.314806][ T9116] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.321877][ T9116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 386.342653][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 386.352104][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 386.360939][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 386.369473][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 386.386500][ T9541] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 386.398114][ T9541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 386.406683][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 386.426758][ T9541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 386.434281][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 386.442507][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 386.651692][ T9552] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.659888][ T9552] bridge0: port 1(bridge_slave_0) entered disabled state 01:03:36 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) r3 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r3, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) 01:03:36 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:36 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r5}) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r6, 0x0, 0x7fffffa7) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) 01:03:36 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:36 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:36 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) [ 387.152927][ T26] kauditd_printk_skb: 39 callbacks suppressed [ 387.152949][ T26] audit: type=1800 audit(1576112617.097:276): pid=9559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=88 res=0 [ 387.328585][ T26] audit: type=1800 audit(1576112617.097:275): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="loop2" ino=89 res=0 [ 387.464418][ T26] audit: type=1800 audit(1576112617.097:277): pid=9562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="loop0" ino=90 res=0 [ 387.587205][ T26] audit: type=1804 audit(1576112617.097:278): pid=9559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir035652892/syzkaller.6Q8z6K/43/file0/file0" dev="loop3" ino=88 res=1 [ 387.718356][ T26] audit: type=1804 audit(1576112617.097:279): pid=9556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/47/file0/file0" dev="loop2" ino=89 res=1 [ 387.861273][ T26] audit: type=1804 audit(1576112617.097:280): pid=9562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir721904851/syzkaller.PJRgED/38/file0/file0" dev="loop0" ino=90 res=1 01:03:37 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r5}) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r6, 0x0, 0x7fffffa7) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) 01:03:37 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:37 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:37 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) r3 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r3, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r3, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r4 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 387.955237][ T26] audit: type=1800 audit(1576112617.147:281): pid=9566 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="loop1" ino=91 res=0 [ 387.978531][ T26] audit: type=1800 audit(1576112617.167:282): pid=9558 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=92 res=0 01:03:37 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) [ 388.017206][ T26] audit: type=1804 audit(1576112617.197:283): pid=9575 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir721904851/syzkaller.PJRgED/38/file0/file0" dev="loop0" ino=90 res=1 01:03:38 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) [ 388.050375][ T26] audit: type=1804 audit(1576112617.237:284): pid=9574 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir066200487/syzkaller.4h9o2a/47/file0/file0" dev="loop2" ino=89 res=1 01:03:38 executing program 5: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000230047080000428c87a087cbbf007600b3a2fec6371e1a"], 0x14}}, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r2 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e25, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000240)={'bridge0\x00', {0x2, 0x4e21, @multicast2}}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) write$FUSE_OPEN(r4, &(0x7f00000001c0)={0x20}, 0x20) write$vnet(r4, &(0x7f00000004c0)={0x1, {&(0x7f0000000300)=""/226, 0xe2, &(0x7f0000000400)=""/170, 0x3}}, 0x68) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f00000001c0)) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f800000016001d0300000000000000521700001e000000007f000000000000000000f7ffff81f2571bf5a594f3833a0a6e3618b9ff000000", @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) [ 388.646233][ T9606] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 388.655136][ T9606] FAT-fs (loop2): Filesystem has been set read-only [ 388.662258][ T9606] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 01:03:38 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 388.867136][ T9601] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 388.938849][ T9601] FAT-fs (loop1): Filesystem has been set read-only [ 388.951274][ T9601] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) 01:03:39 executing program 0: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:39 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) [ 389.311279][ T2608] device bridge_slave_1 left promiscuous mode [ 389.320218][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.401526][ T2608] device bridge_slave_0 left promiscuous mode [ 389.411306][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state 01:03:39 executing program 3: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) sendfile(0xffffffffffffffff, r2, 0x0, 0xffffffff) 01:03:39 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', r6}) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000800), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$msdos(&(0x7f0000001880)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="2c756d61736b3d303030590da5d3a7d59e56e3d430303030303030303030303030303030303030302c6f626a5f7479fd653d7468726561646564a02c6f626a5f747970653d2d6e6f6465765d2b656d315b2fc8242d6b657972696e6770726f6365746830656d3073656c696e7578766d"]) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000900), 0xfffffcec) sendfile(r8, r2, 0x0, 0xffffffff) 01:03:39 executing program 2: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r2, r6, 0x0, 0x7fffffa7) r7 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r7, r2, 0x0, 0xffffffff) [ 390.329669][ T9640] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 390.390746][ T9640] FAT-fs (loop4): Filesystem has been set read-only [ 390.409488][ T9640] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 390.420398][ C0] ================================================================== [ 390.428567][ C0] BUG: KCSAN: data-race in inc_node_page_state / release_pages [ 390.436120][ C0] [ 390.438475][ C0] write to 0xffffea0004434ac0 of 8 bytes by task 9648 on cpu 1: [ 390.446141][ C0] release_pages+0x427/0x980 [ 390.450766][ C0] __pagevec_release+0x53/0x90 [ 390.455722][ C0] invalidate_mapping_pages+0x741/0x900 [ 390.455937][ T9627] syz-executor.1 (9627) used greatest stack depth: 9800 bytes left [ 390.461407][ C0] __generic_file_write_iter+0x365/0x380 [ 390.461419][ C0] generic_file_write_iter+0x28c/0x390 [ 390.461431][ C0] do_iter_readv_writev+0x487/0x5b0 [ 390.461442][ C0] do_iter_write+0x13b/0x3c0 [ 390.461453][ C0] vfs_iter_write+0x5c/0x80 [ 390.461535][ C0] iter_file_splice_write+0x4c0/0x7f0 [ 390.501376][ C0] direct_splice_actor+0xa0/0xc0 [ 390.506331][ C0] splice_direct_to_actor+0x215/0x510 [ 390.511811][ C0] do_splice_direct+0x161/0x1e0 [ 390.516998][ C0] do_sendfile+0x384/0x7f0 [ 390.521445][ C0] __x64_sys_sendfile64+0x12a/0x140 [ 390.526667][ C0] do_syscall_64+0xcc/0x370 [ 390.531189][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 390.537078][ C0] [ 390.539566][ C0] read to 0xffffea0004434ac0 of 8 bytes by interrupt on cpu 0: [ 390.547139][ C0] inc_node_page_state+0x1d/0xc0 [ 390.552105][ C0] test_clear_page_writeback+0x33f/0x790 [ 390.557762][ C0] end_page_writeback+0x9e/0x190 [ 390.562714][ C0] end_buffer_async_write+0x2dc/0x3a0 [ 390.568102][ C0] end_bio_bh_io_sync+0x87/0xb0 [ 390.572961][ C0] bio_endio+0x3a8/0x4f0 [ 390.577224][ C0] blk_update_request+0x427/0x7b0 [ 390.582441][ C0] blk_mq_end_request+0x3f/0x2b0 [ 390.587397][ C0] lo_complete_rq+0x136/0x1a0 [ 390.592184][ C0] blk_done_softirq+0x1eb/0x250 [ 390.597167][ C0] __do_softirq+0x115/0x33f [ 390.601703][ C0] run_ksoftirqd+0x46/0x60 [ 390.606229][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 390.611192][ C0] kthread+0x1d4/0x200 [ 390.615835][ C0] ret_from_fork+0x1f/0x30 [ 390.620426][ C0] [ 390.622763][ C0] Reported by Kernel Concurrency Sanitizer on: [ 390.629394][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.4.0-syzkaller #0 [ 390.638043][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.648113][ C0] ================================================================== [ 390.656199][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 390.662919][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.4.0-syzkaller #0 [ 390.670663][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.680723][ C0] Call Trace: [ 390.685125][ C0] dump_stack+0x11d/0x181 [ 390.689501][ C0] panic+0x210/0x640 [ 390.693434][ C0] ? vprintk_func+0x8d/0x140 [ 390.698058][ C0] kcsan_report.cold+0xc/0xd [ 390.702685][ C0] kcsan_setup_watchpoint+0x3fe/0x460 [ 390.708095][ C0] __tsan_read8+0xc6/0x100 [ 390.712997][ C0] inc_node_page_state+0x1d/0xc0 [ 390.717980][ C0] test_clear_page_writeback+0x33f/0x790 [ 390.723653][ C0] end_page_writeback+0x9e/0x190 [ 390.728753][ C0] end_buffer_async_write+0x2dc/0x3a0 [ 390.734827][ C0] ? block_invalidatepage+0x320/0x320 01:03:40 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockname(r0, &(0x7f0000000300)=@generic, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) accept4(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x80000, 0x0) setsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @remote}, 0xc) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f00000000c0)={0x0, @remote, @empty}, &(0x7f0000000100)=0xc) sendmmsg$inet(r3, &(0x7f0000001d00)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000180)="080adcdd6aac0ef2fdbc50d725804c37b661afcac023ff78c79890", 0x1b}], 0x1, &(0x7f0000001dc0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x27f8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast, @local}}}, @ip_retopts={{0x4c, 0x0, 0x7, {[@generic={0x44, 0x9, "cc89bf483038e2"}, @noop, @timestamp={0x44, 0x30, 0xd6, 0x1, 0x6, [{[], 0x3800000}, {}, {[@dev], 0x4}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x7fff}, {[], 0x9}, {[], 0x40}, {[], 0x2}, {[@local], 0x1ff}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @rand_addr=0xd14, @local}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_retopts={{0x84, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x8, 0x0, 0x1, [{[@loopback]}, {}, {[@empty], 0x1}]}, @rr={0x7, 0xb, 0x29, [@multicast2, @multicast2]}, @generic={0x83, 0x2}, @lsrr={0x83, 0x1b, 0x1, [@loopback, @rand_addr=0x5, @rand_addr=0x8, @multicast2, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1]}, @ssrr={0x89, 0x23, 0x3, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @multicast2, @loopback, @local, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @end, @rr={0x7, 0xf, 0x3, [@local, @loopback, @multicast1]}]}}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000001b00)="10837532cf3afe8d3aded6e13cddc3267759d6e326e92da7608298cbe82693d6f6150cb5a6d9e14ed87252e6d816c0baf8a0a89ee48c8e58958e831d4ee29adde715053afdd3c080adcf9cc9b4bd4bebb6185327a157cbbb1e54ea7905b92867bdfc6031b9c98b551efd759633bc1a436ca531b07473ef77a6f33dbcc80070202ccdea27e2dbf96fbc6dedf2fd426ffb08afb05588358814c918e1013e3780703c3940", 0xa3}], 0x1, &(0x7f0000001c40)=[@ip_retopts={{0x80, 0x0, 0x7, {[@timestamp={0x44, 0x18, 0x0, 0x3, 0x0, [{[], 0x3}, {}, {[@loopback]}, {[], 0x3f}]}, @timestamp={0x44, 0xc, 0x7f, 0x1, 0xc, [{[@loopback], 0x3f}]}, @rr={0x7, 0x13, 0x6, [@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @multicast1]}, @timestamp={0x44, 0x8, 0x98, 0x0, 0xe, [{[], 0x1000}]}, @ra={0x94, 0x6}, @lsrr={0x83, 0xb, 0x3f, [@empty, @empty]}, @ssrr={0x89, 0x1f, 0x1, [@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}, @remote, @empty, @rand_addr=0x6, @remote]}, @noop]}}}], 0x80}}], 0x2, 0x8000) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x6, 0xc36d, 0x0, 0xad5, 0x17, 0x5, 0x0, 0x0, 0xe5d9, 0x0, 0x4, 0x7f}) write(r2, &(0x7f0000000600)="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", 0x200) sendfile(r2, r7, 0x0, 0x7fffffa7) r8 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r8, r2, 0x0, 0xffffffff) [ 390.740351][ C0] end_bio_bh_io_sync+0x87/0xb0 [ 390.745479][ C0] ? invalidate_bh_lrus+0x40/0x40 [ 390.750622][ C0] bio_endio+0x3a8/0x4f0 [ 390.755043][ C0] blk_update_request+0x427/0x7b0 [ 390.760408][ C0] blk_mq_end_request+0x3f/0x2b0 [ 390.765466][ C0] lo_complete_rq+0x136/0x1a0 [ 390.770176][ C0] blk_done_softirq+0x1eb/0x250 [ 390.775072][ C0] __do_softirq+0x115/0x33f [ 390.780656][ C0] ? takeover_tasklets+0x250/0x250 [ 390.785805][ C0] run_ksoftirqd+0x46/0x60 [ 390.790250][ C0] smpboot_thread_fn+0x37d/0x4a0 [ 390.795309][ C0] kthread+0x1d4/0x200 [ 390.799512][ C0] ? constant_test_bit.constprop.0+0x30/0x30 [ 390.805512][ C0] ? kthread_stop+0x2d0/0x2d0 [ 390.810224][ C0] ret_from_fork+0x1f/0x30 [ 390.816654][ C0] Kernel Offset: disabled [ 390.821132][ C0] Rebooting in 86400 seconds..