_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) 14:55:03 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:55:03 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$invalidate(0x15, r0) request_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, r0) 14:55:03 executing program 3: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x83, 0x4000000000000800, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) 14:55:03 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:55:03 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) r1 = add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, 0x0, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0xfffffffffffffef7, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 243.083434][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 243.083439][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 243.083482][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 243.089395][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:55:03 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) [ 243.312300][T10439] binder: 10437:10439 ioctl c0306201 20000000 returned -14 [ 243.357555][T10445] binder: 10437:10445 ioctl c0306201 20000000 returned -14 14:55:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:03 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:55:03 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x40, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x101000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0xc) fchmod(r0, 0xd0) dup2(r1, r2) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000001c00)='./file1\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pause() 14:55:03 executing program 1: clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102009ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'\x00\x00\xf6\x8c\x00\x00\x00\x00\x9bU\x00\x00\xc5\xcb\x00', 0x43732e5398416f1a}) ioctl$PIO_FONT(r0, 0x4b61, 0x0) 14:55:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) pread64(r1, 0x0, 0x0, 0x0) 14:55:03 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:04 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 14:55:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000003140), 0x4000) [ 243.762735][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 243.762749][ T27] audit: type=1804 audit(1574693704.098:31): pid=10460 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir224439136/syzkaller.aJkpZI/75/file1" dev="sda1" ino=16872 res=1 14:55:04 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(0x0, 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:04 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 14:55:04 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022422a0e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000080da7b5d8088ed6e5b0300"/1021], 0x3fd) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 14:55:04 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) 14:55:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:04 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(0x0, 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:04 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x3c) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000200)={0xffffffffffffffff, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/587], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff81", 0x0, 0x100, 0xf2ffffff, 0xdf4c8c2c, 0x186, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d831a98132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 14:55:04 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000003140), 0x0) 14:55:04 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 14:55:04 executing program 3: r0 = epoll_create1(0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) fchdir(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x40, &(0x7f00000001c0)) r1 = getpgid(0x0) perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\a\xd2\x8f(.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e\xab\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\x15v$\xc5\xbc\x11N\t\x9ej5)\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\t\xbf\x85\x98~\v\xd8D\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xc2\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\x01\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\xd7\xeeI\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|\x00\x00\x00\x00\x00\x00\x00\x00\x91\x00+/pF\xfa]\xc4\xb3\xfc~\x13\xc3\x8aV\xa5\n\xe9H\xad\xf5\xa7{\x90\b\x9bb\xb8gY\xdb', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)={0x20000001}) [ 244.530212][ T27] audit: type=1804 audit(1574693704.868:32): pid=10499 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir224439136/syzkaller.aJkpZI/75/file1" dev="sda1" ino=16872 res=1 14:55:05 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:05 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 14:55:05 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x18) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x8) setsockopt$inet6_int(r1, 0x29, 0x35, &(0x7f0000000100)=0x101, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffea4) socket$inet6(0xa, 0x0, 0x0) tgkill(0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) mmap(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x126) prctl$PR_GET_KEEPCAPS(0x7) fdatasync(0xffffffffffffffff) ftruncate(r2, 0x7fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) 14:55:05 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(0x0, 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:05 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 244.928958][T10541] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:55:05 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:05 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) socket$inet6(0xa, 0x80003, 0xff) read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:05 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r3, 0xc0104320, &(0x7f0000000100)={0x2, 0x0}) 14:55:05 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:06 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r2, 0x6e, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x281ba9cbf1677496}]) fallocate(r0, 0x100000003, 0x0, 0x1) 14:55:08 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:08 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) socket$inet6(0xa, 0x80003, 0xff) read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) creat(&(0x7f00000000c0)='./file0\x00', 0xa1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 14:55:08 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:08 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0x17) sendfile(0xffffffffffffffff, r0, 0x0, 0x8080fffffffe) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r2 = dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 14:55:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:08 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) socket$inet6(0xa, 0x80003, 0xff) read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 247.923468][ T27] audit: type=1804 audit(1574693708.258:33): pid=10592 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir224439136/syzkaller.aJkpZI/79/file0" dev="sda1" ino=16890 res=1 14:55:08 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0408cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="eabe9f303b222957eecbc624877c785255f910c28f5e87a64820546a1ebed56adb3b91e7f1ffd7e4ab569f8e39808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f2c4af37bd3d3", @ANYRESHEX=0x0, @ANYRESOCT, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296c43b3897cc275fd8fc333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecd4f9ad0300"], 0x0, 0xd2}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:55:08 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x6) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x276, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}, 0x100) pipe(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd(0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) [ 248.013798][T10605] ptrace attach of "/root/syz-executor.0"[10604] was attempted by "/root/syz-executor.0"[10605] 14:55:08 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) [ 248.042063][ T27] audit: type=1804 audit(1574693708.368:34): pid=10593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515074247/syzkaller.SETFFs/79/bus" dev="sda1" ino=16891 res=1 14:55:08 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:08 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0x17) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r2 = dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 248.189122][ T27] audit: type=1800 audit(1574693708.428:35): pid=10593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16891 res=0 [ 248.324130][ T27] audit: type=1804 audit(1574693708.668:36): pid=10624 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515074247/syzkaller.SETFFs/80/bus" dev="sda1" ino=16892 res=1 [ 248.421185][ T27] audit: type=1804 audit(1574693708.758:37): pid=10625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515074247/syzkaller.SETFFs/80/bus" dev="sda1" ino=16892 res=1 [ 249.099267][ T27] audit: type=1804 audit(1574693709.438:38): pid=10625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515074247/syzkaller.SETFFs/80/bus" dev="sda1" ino=16892 res=1 [ 249.127714][ T27] audit: type=1804 audit(1574693709.448:39): pid=10625 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515074247/syzkaller.SETFFs/80/bus" dev="sda1" ino=16892 res=1 14:55:11 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:11 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:11 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:11 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x6) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x276, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001800)=""/4096, 0x1000}], 0x1}, 0x100) pipe(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = eventfd(0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 14:55:11 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0x17) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r2 = dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 251.048567][ T27] audit: type=1804 audit(1574693711.388:40): pid=10637 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515074247/syzkaller.SETFFs/81/bus" dev="sda1" ino=16903 res=1 14:55:11 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:11 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(0x0, 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) [ 251.217169][ T27] audit: type=1804 audit(1574693711.558:41): pid=10644 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515074247/syzkaller.SETFFs/81/bus" dev="sda1" ino=16903 res=1 14:55:11 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:11 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(0x0, 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:11 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(0x0, 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:12 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xfdef) 14:55:14 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:14 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0x17) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r2 = dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 14:55:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:14 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xfdef) 14:55:14 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r2 = dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 14:55:14 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 254.213309][ T27] audit: type=1804 audit(1574693714.548:42): pid=10678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515074247/syzkaller.SETFFs/82/bus" dev="sda1" ino=16916 res=1 [ 254.283466][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 254.289372][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:55:14 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xfdef) [ 254.350843][ T27] audit: type=1804 audit(1574693714.688:43): pid=10689 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir515074247/syzkaller.SETFFs/82/bus" dev="sda1" ino=16916 res=1 [ 254.429889][ T27] audit: type=1804 audit(1574693714.748:44): pid=10688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir224439136/syzkaller.aJkpZI/83/bus" dev="sda1" ino=16927 res=1 14:55:14 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, 0x0, 0x0) 14:55:15 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, 0x0, 0x0) 14:55:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:15 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, 0x0, 0x0) 14:55:15 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 255.079647][ T27] audit: type=1800 audit(1574693715.418:45): pid=10688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16927 res=0 14:55:17 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:17 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0xfffffffc, 0x3, 0x0, 0xfffffffff7fffffb}, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x100000003, 0x7f) sendto$inet6(r1, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r2 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, r2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr(r3, 0x0, &(0x7f0000000100)='\x00', 0x1, 0x2) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8020001) socket$inet6(0xa, 0x80002, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) socket(0x0, 0x0, 0xc) 14:55:17 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x11, &(0x7f0000000040)=0xfa0, 0x4) 14:55:17 executing program 4: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000440)=0xffffffff) 14:55:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:17 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:17 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x2, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 14:55:17 executing program 4: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000600)=""/85, 0x55}, {0x0}, {0x0}, {0x0}], 0x4}}, {{0x0, 0x0, &(0x7f00000035c0), 0x0, &(0x7f0000003680)=""/187, 0xbb}}], 0x2, 0x0, &(0x7f0000005480)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) setreuid(0x0, 0x0) getresuid(&(0x7f0000004180), 0x0, 0x0) 14:55:17 executing program 0: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(r1, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:18 executing program 0: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(r1, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:18 executing program 3: 14:55:18 executing program 0: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(r1, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:20 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:20 executing program 3: 14:55:20 executing program 4: 14:55:20 executing program 0: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(r1, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:20 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:20 executing program 3: 14:55:21 executing program 4: 14:55:21 executing program 0: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:21 executing program 3: 14:55:21 executing program 4: 14:55:21 executing program 3: 14:55:24 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:24 executing program 4: 14:55:24 executing program 0: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:24 executing program 3: 14:55:24 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:24 executing program 3: 14:55:24 executing program 4: 14:55:24 executing program 0: r0 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:24 executing program 4: 14:55:24 executing program 3: 14:55:24 executing program 4: 14:55:27 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:27 executing program 4: 14:55:27 executing program 0: open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(r0, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:27 executing program 3: 14:55:27 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(r0, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:27 executing program 3: 14:55:27 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x800, 0x0) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000000)=""/62, 0x3e}], 0x1) 14:55:27 executing program 3: 14:55:27 executing program 4: 14:55:27 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:30 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:30 executing program 4: 14:55:30 executing program 3: r0 = socket(0xa, 0x40000000002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) 14:55:30 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:30 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:30 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getdents64(r0, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r1, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r1) 14:55:30 executing program 0: syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r1, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r1) 14:55:30 executing program 0: syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:33 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r1, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r1) 14:55:33 executing program 0: syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(0xffffffffffffffff, &(0x7f0000000df0)=""/528, 0x7f355eb8) 14:55:33 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r1, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r1) 14:55:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) close(r1) 14:55:33 executing program 4 (fault-call:9 fault-nth:0): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(r0, 0x0, 0x0) [ 273.466653][T10911] FAULT_INJECTION: forcing a failure. [ 273.466653][T10911] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 273.483446][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 273.489378][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 273.502923][T10911] CPU: 0 PID: 10911 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 273.512854][T10911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.523063][T10911] Call Trace: [ 273.526398][T10911] dump_stack+0x197/0x210 [ 273.530731][T10911] should_fail.cold+0xa/0x15 [ 273.535344][T10911] ? fault_create_debugfs_attr+0x180/0x180 [ 273.541175][T10911] ? ___might_sleep+0x163/0x2c0 [ 273.546052][T10911] should_fail_alloc_page+0x50/0x60 [ 273.551300][T10911] __alloc_pages_nodemask+0x1a1/0x910 [ 273.556690][T10911] ? xas_start+0x166/0x560 [ 273.561132][T10911] ? __alloc_pages_slowpath+0x2900/0x2900 14:55:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) close(r1) 14:55:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) close(r1) [ 273.566879][T10911] ? find_get_entry+0x4c4/0x920 [ 273.571756][T10911] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 273.578011][T10911] alloc_pages_current+0x107/0x210 [ 273.583146][T10911] __page_cache_alloc+0x29d/0x490 [ 273.588186][T10911] pagecache_get_page+0x286/0xb00 [ 273.593225][T10911] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 273.599573][T10911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.605829][T10911] grab_cache_page_write_begin+0x75/0xb0 [ 273.611490][T10911] simple_write_begin+0x36/0x2d0 [ 273.616452][T10911] generic_perform_write+0x23b/0x540 [ 273.621770][T10911] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 273.629859][T10911] ? current_time+0x110/0x110 [ 273.634558][T10911] ? __kasan_check_write+0x14/0x20 [ 273.639700][T10911] ? down_write+0xdf/0x150 [ 273.646355][T10911] __generic_file_write_iter+0x25e/0x630 [ 273.652013][T10911] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 273.657761][T10911] generic_file_write_iter+0x420/0x68e 14:55:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(0xffffffffffffffff) [ 273.663242][T10911] ? __generic_file_write_iter+0x630/0x630 [ 273.669061][T10911] ? __kasan_check_read+0x11/0x20 [ 273.674099][T10911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.680352][T10911] ? iov_iter_init+0xee/0x220 [ 273.685035][T10911] new_sync_write+0x4d3/0x770 [ 273.685065][T10911] ? new_sync_read+0x800/0x800 [ 273.685090][T10911] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 273.685109][T10911] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 273.685127][T10911] __vfs_write+0xe1/0x110 [ 273.694662][T10911] vfs_write+0x268/0x5d0 [ 273.714642][T10911] ksys_write+0x14f/0x290 [ 273.719012][T10911] ? __ia32_sys_read+0xb0/0xb0 [ 273.723808][T10911] ? do_syscall_64+0x26/0x790 [ 273.728504][T10911] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.734585][T10911] ? do_syscall_64+0x26/0x790 [ 273.739301][T10911] __x64_sys_write+0x73/0xb0 [ 273.743929][T10911] do_syscall_64+0xfa/0x790 [ 273.748458][T10911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.754363][T10911] RIP: 0033:0x45a639 [ 273.758271][T10911] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.777881][T10911] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 273.777894][T10911] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 273.777902][T10911] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 273.777909][T10911] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 273.777916][T10911] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 273.777924][T10911] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 273.779228][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 273.819105][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:55:36 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(0xffffffffffffffff) 14:55:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(r0, 0x0, 0x0) 14:55:36 executing program 4 (fault-call:9 fault-nth:1): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:36 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(0xffffffffffffffff, &(0x7f0000000140)=""/39, 0x27) 14:55:36 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(0xffffffffffffffff, &(0x7f0000000140)=""/39, 0x27) 14:55:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(0xffffffffffffffff) 14:55:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net\x00') getdents64(r0, 0x0, 0x0) [ 276.533716][T10940] FAULT_INJECTION: forcing a failure. [ 276.533716][T10940] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 276.629548][T10940] CPU: 0 PID: 10940 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 276.639497][T10940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.649565][T10940] Call Trace: [ 276.652890][T10940] dump_stack+0x197/0x210 [ 276.657250][T10940] should_fail.cold+0xa/0x15 [ 276.661865][T10940] ? fault_create_debugfs_attr+0x180/0x180 [ 276.667685][T10940] ? ___might_sleep+0x163/0x2c0 [ 276.672586][T10940] should_fail_alloc_page+0x50/0x60 [ 276.677802][T10940] __alloc_pages_nodemask+0x1a1/0x910 [ 276.683210][T10940] ? xas_start+0x166/0x560 [ 276.687653][T10940] ? __alloc_pages_slowpath+0x2900/0x2900 [ 276.693392][T10940] ? find_get_entry+0x4c4/0x920 [ 276.698255][T10940] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 276.705399][T10940] alloc_pages_current+0x107/0x210 [ 276.710534][T10940] __page_cache_alloc+0x29d/0x490 [ 276.715579][T10940] pagecache_get_page+0x286/0xb00 [ 276.720622][T10940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.729668][T10940] grab_cache_page_write_begin+0x75/0xb0 [ 276.735298][T10940] simple_write_begin+0x36/0x2d0 [ 276.735315][T10940] generic_perform_write+0x23b/0x540 [ 276.735339][T10940] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 276.735354][T10940] ? current_time+0x110/0x110 [ 276.735375][T10940] ? __kasan_check_write+0x14/0x20 [ 276.763409][T10940] ? down_write+0xdf/0x150 [ 276.763432][T10940] __generic_file_write_iter+0x25e/0x630 [ 276.763446][T10940] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 276.763465][T10940] generic_file_write_iter+0x420/0x68e [ 276.773496][T10940] ? __generic_file_write_iter+0x630/0x630 [ 276.790442][T10940] ? __kasan_check_read+0x11/0x20 [ 276.795484][T10940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.801744][T10940] ? iov_iter_init+0xee/0x220 [ 276.806444][T10940] new_sync_write+0x4d3/0x770 [ 276.811142][T10940] ? new_sync_read+0x800/0x800 [ 276.815930][T10940] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 276.822107][T10940] ? rcu_read_lock_bh_held+0xb0/0xb0 14:55:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) 14:55:37 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) [ 276.827414][T10940] __vfs_write+0xe1/0x110 [ 276.831761][T10940] vfs_write+0x268/0x5d0 [ 276.836037][T10940] ksys_write+0x14f/0x290 [ 276.840382][T10940] ? __ia32_sys_read+0xb0/0xb0 [ 276.845192][T10940] ? do_syscall_64+0x26/0x790 [ 276.849890][T10940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.855969][T10940] ? do_syscall_64+0x26/0x790 [ 276.860660][T10940] __x64_sys_write+0x73/0xb0 [ 276.865269][T10940] do_syscall_64+0xfa/0x790 [ 276.869788][T10940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.875694][T10940] RIP: 0033:0x45a639 [ 276.879795][T10940] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.899486][T10940] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 276.899499][T10940] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 276.899506][T10940] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 14:55:37 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(0xffffffffffffffff, &(0x7f0000000140)=""/39, 0x27) [ 276.899513][T10940] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 276.899521][T10940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 276.899528][T10940] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 14:55:39 executing program 0: 14:55:39 executing program 4 (fault-call:9 fault-nth:2): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:39 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x80006, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) 14:55:39 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:39 executing program 2: r0 = socket(0x0, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:40 executing program 0: syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0xa1801) [ 279.695975][T10976] FAULT_INJECTION: forcing a failure. [ 279.695975][T10976] name failslab, interval 1, probability 0, space 0, times 1 [ 279.708936][T10976] CPU: 0 PID: 10976 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 279.718826][T10976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.728904][T10976] Call Trace: [ 279.732238][T10976] dump_stack+0x197/0x210 [ 279.736600][T10976] should_fail.cold+0xa/0x15 14:55:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001640)=ANY=[@ANYBLOB="140000000301ffff808fc201000000000000101b"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000e00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000001900)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/251, 0xfb}], 0x2, &(0x7f0000000ec0)=""/27, 0x1b}}], 0x2, 0x0, 0x0) [ 279.741213][T10976] ? fault_create_debugfs_attr+0x180/0x180 [ 279.741233][T10976] ? __kasan_check_read+0x11/0x20 [ 279.741248][T10976] ? mark_lock+0xc2/0x1220 [ 279.741268][T10976] __should_failslab+0x121/0x190 [ 279.761732][T10976] should_failslab+0x9/0x14 [ 279.766256][T10976] kmem_cache_alloc+0x47/0x710 [ 279.771069][T10976] ? __kasan_check_read+0x11/0x20 [ 279.776860][T10976] xas_alloc+0x346/0x460 [ 279.781128][T10976] xas_create+0x5b2/0x1060 [ 279.785566][T10976] ? mark_held_locks+0xf0/0xf0 [ 279.790451][T10976] xas_store+0x9a/0x1a00 [ 279.794713][T10976] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.800982][T10976] ? xas_start+0x166/0x560 [ 279.805431][T10976] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.811780][T10976] ? xas_load+0x67/0x150 [ 279.816036][T10976] __add_to_page_cache_locked+0x5d2/0xfd0 [ 279.816057][T10976] ? find_get_pages_range_tag+0xdb0/0xdb0 [ 279.816072][T10976] ? __alloc_pages_nodemask+0x661/0x910 [ 279.816083][T10976] ? xas_start+0x166/0x560 [ 279.816102][T10976] ? shadow_lru_isolate+0x430/0x430 [ 279.816119][T10976] ? find_get_entry+0x4c4/0x920 [ 279.847574][T10976] add_to_page_cache_lru+0x1d8/0x790 [ 279.852880][T10976] ? add_to_page_cache_locked+0x40/0x40 [ 279.858440][T10976] ? __page_cache_alloc+0x116/0x490 [ 279.863659][T10976] pagecache_get_page+0x3c6/0xb00 [ 279.868708][T10976] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.874966][T10976] grab_cache_page_write_begin+0x75/0xb0 [ 279.880612][T10976] simple_write_begin+0x36/0x2d0 [ 279.885563][T10976] generic_perform_write+0x23b/0x540 [ 279.890869][T10976] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 279.898943][T10976] ? current_time+0x110/0x110 [ 279.903649][T10976] ? __kasan_check_write+0x14/0x20 [ 279.908789][T10976] ? down_write+0xdf/0x150 [ 279.913225][T10976] __generic_file_write_iter+0x25e/0x630 [ 279.918888][T10976] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 279.924608][T10976] generic_file_write_iter+0x420/0x68e [ 279.930078][T10976] ? __generic_file_write_iter+0x630/0x630 [ 279.935979][T10976] ? __kasan_check_read+0x11/0x20 [ 279.940984][T10976] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.947210][T10976] ? iov_iter_init+0xee/0x220 [ 279.951876][T10976] new_sync_write+0x4d3/0x770 [ 279.956665][T10976] ? new_sync_read+0x800/0x800 [ 279.961471][T10976] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 279.967713][T10976] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 279.972997][T10976] __vfs_write+0xe1/0x110 [ 279.978271][T10976] vfs_write+0x268/0x5d0 [ 279.982500][T10976] ksys_write+0x14f/0x290 [ 279.986815][T10976] ? __ia32_sys_read+0xb0/0xb0 [ 279.991562][T10976] ? do_syscall_64+0x26/0x790 [ 279.996233][T10976] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.002281][T10976] ? do_syscall_64+0x26/0x790 [ 280.006944][T10976] __x64_sys_write+0x73/0xb0 [ 280.011517][T10976] do_syscall_64+0xfa/0x790 [ 280.016019][T10976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.021891][T10976] RIP: 0033:0x45a639 [ 280.025790][T10976] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.045388][T10976] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 280.053870][T10976] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 280.061836][T10976] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 280.069795][T10976] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 280.077937][T10976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 280.085894][T10976] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 280.094216][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 280.100016][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 280.107157][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 280.112939][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:55:40 executing program 2: r0 = socket(0x0, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:40 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x80006, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) 14:55:40 executing program 2: r0 = socket(0x0, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:40 executing program 4 (fault-call:9 fault-nth:3): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:40 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x80006, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) 14:55:40 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd619}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81}, 0x3c) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000200)={0xffffffffffffffff, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e07dfbdfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ce72c74f3db890e1ff15a10d91f67e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd117252e47ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c6e62d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db2699f1210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a852b55c9a74ca196700218f9197e7a5513c13e79d46bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb400"/587], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff81", 0x0, 0x100, 0xf2ffffff, 0xdf4c8c2c, 0x186, &(0x7f0000000280)="f2a134bd13c7bd41a2a738ad8e7625ed330eb46063bd287d831a98132e59ef45f8f50845c0ac85604b448e24348e4ae93e68238b7b9d561b349d19b5f5784e031c55c5a4e48926a1526e38640a161fab39732052ee83bc3b9cb625962f3eaf1ed426e6f0442693c16b0ab6a89a5738f5bccd6ae1492f8471a7afec6b", &(0x7f0000000380)="712ae01ebf877f139c8f1b0fcd056310bfa3de7157976d3ff4c82f2e0d1885774c5b7c7c853e5424fbf469ab0726e9f41208f98d20b093ddbb7f52e015b875cea2900b2443348cdf466c18cfae89ce96f0437cb21ca3703f0b94273c7500"/106}, 0x28) 14:55:40 executing program 2: r0 = socket(0x40000000015, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 280.391070][T11006] FAULT_INJECTION: forcing a failure. [ 280.391070][T11006] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 280.434693][T11006] CPU: 1 PID: 11006 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 280.444653][T11006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.455022][T11006] Call Trace: [ 280.458372][T11006] dump_stack+0x197/0x210 [ 280.462735][T11006] should_fail.cold+0xa/0x15 [ 280.467346][T11006] ? fault_create_debugfs_attr+0x180/0x180 [ 280.473149][T11006] ? ___might_sleep+0x163/0x2c0 [ 280.473173][T11006] should_fail_alloc_page+0x50/0x60 [ 280.473190][T11006] __alloc_pages_nodemask+0x1a1/0x910 [ 280.473211][T11006] ? __alloc_pages_slowpath+0x2900/0x2900 [ 280.494330][T11006] ? find_get_entry+0x4c4/0x920 [ 280.499202][T11006] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 280.505463][T11006] alloc_pages_current+0x107/0x210 [ 280.510620][T11006] __page_cache_alloc+0x29d/0x490 [ 280.515686][T11006] pagecache_get_page+0x286/0xb00 [ 280.520748][T11006] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.523453][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 280.527023][T11006] grab_cache_page_write_begin+0x75/0xb0 [ 280.532806][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 280.538517][T11006] simple_write_begin+0x36/0x2d0 [ 280.538535][T11006] generic_perform_write+0x23b/0x540 [ 280.538549][T11006] ? timestamp_truncate+0x2f0/0x2f0 [ 280.538576][T11006] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 280.567717][T11006] ? current_time+0x110/0x110 [ 280.572420][T11006] ? __kasan_check_write+0x14/0x20 [ 280.577563][T11006] ? down_write+0xdf/0x150 [ 280.577583][T11006] __generic_file_write_iter+0x25e/0x630 [ 280.577598][T11006] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 280.577617][T11006] generic_file_write_iter+0x420/0x68e [ 280.577636][T11006] ? __generic_file_write_iter+0x630/0x630 [ 280.577651][T11006] ? __kasan_check_read+0x11/0x20 [ 280.577665][T11006] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 280.577680][T11006] ? iov_iter_init+0xee/0x220 [ 280.577700][T11006] new_sync_write+0x4d3/0x770 [ 280.577717][T11006] ? new_sync_read+0x800/0x800 [ 280.577739][T11006] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 280.617724][T11006] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 280.643260][T11006] __vfs_write+0xe1/0x110 [ 280.647610][T11006] vfs_write+0x268/0x5d0 [ 280.651877][T11006] ksys_write+0x14f/0x290 [ 280.656234][T11006] ? __ia32_sys_read+0xb0/0xb0 [ 280.661013][T11006] ? do_syscall_64+0x26/0x790 [ 280.665709][T11006] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.671787][T11006] ? do_syscall_64+0x26/0x790 [ 280.676484][T11006] __x64_sys_write+0x73/0xb0 [ 280.681094][T11006] do_syscall_64+0xfa/0x790 [ 280.685642][T11006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.691888][T11006] RIP: 0033:0x45a639 [ 280.695792][T11006] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.715492][T11006] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 280.723921][T11006] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 280.731915][T11006] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 280.739908][T11006] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 280.747912][T11006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 280.755882][T11006] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 280.764185][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 280.769961][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:55:43 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:43 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) 14:55:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:43 executing program 2: r0 = socket(0x40000000015, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:43 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x48}, 0x0) 14:55:43 executing program 4 (fault-call:9 fault-nth:4): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:43 executing program 2: r0 = socket(0x40000000015, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:43 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) [ 282.843526][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 282.849424][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:55:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bf9bb4dde984510c82dc2b9381b72b100d0682fd0a0c4906b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287c84ccc727d6ef3834293812e927c01c7da1322da44c7f2ed1084aa2f56d1cb398dff1db3df9858837458a4ca03767c69cee1b6be484e4c9507af216bd8ed42f7dd5adb8e49f4a94615e49c08c9a208e4557cd4ed88b37ab8d7674c644dca2f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630277fbac14140ce0", 0x0, 0x9}, 0x28) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x3f, 0x20, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000015c0)}, 0x0) [ 282.886627][T11030] FAULT_INJECTION: forcing a failure. [ 282.886627][T11030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:55:43 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) [ 283.011829][T11030] CPU: 0 PID: 11030 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 283.021778][T11030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.031847][T11030] Call Trace: [ 283.035157][T11030] dump_stack+0x197/0x210 [ 283.039522][T11030] should_fail.cold+0xa/0x15 [ 283.044148][T11030] ? fault_create_debugfs_attr+0x180/0x180 [ 283.049978][T11030] ? ___might_sleep+0x163/0x2c0 [ 283.054858][T11030] should_fail_alloc_page+0x50/0x60 [ 283.060079][T11030] __alloc_pages_nodemask+0x1a1/0x910 [ 283.065473][T11030] ? __alloc_pages_slowpath+0x2900/0x2900 [ 283.071215][T11030] ? find_get_entry+0x4c4/0x920 [ 283.076183][T11030] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 283.082438][T11030] alloc_pages_current+0x107/0x210 [ 283.087561][T11030] __page_cache_alloc+0x29d/0x490 [ 283.092693][T11030] pagecache_get_page+0x286/0xb00 [ 283.097738][T11030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.103997][T11030] grab_cache_page_write_begin+0x75/0xb0 [ 283.104017][T11030] simple_write_begin+0x36/0x2d0 [ 283.104034][T11030] generic_perform_write+0x23b/0x540 [ 283.104063][T11030] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 283.104082][T11030] ? current_time+0x110/0x110 [ 283.114634][T11030] ? __kasan_check_write+0x14/0x20 [ 283.114652][T11030] ? down_write+0xdf/0x150 [ 283.114673][T11030] __generic_file_write_iter+0x25e/0x630 [ 283.114687][T11030] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 283.114705][T11030] generic_file_write_iter+0x420/0x68e [ 283.114724][T11030] ? __generic_file_write_iter+0x630/0x630 [ 283.114739][T11030] ? __kasan_check_read+0x11/0x20 [ 283.114752][T11030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.114768][T11030] ? iov_iter_init+0xee/0x220 [ 283.114789][T11030] new_sync_write+0x4d3/0x770 [ 283.114805][T11030] ? new_sync_read+0x800/0x800 [ 283.114826][T11030] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 283.114847][T11030] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 283.201683][T11030] __vfs_write+0xe1/0x110 [ 283.206042][T11030] vfs_write+0x268/0x5d0 14:55:43 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) 14:55:43 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) [ 283.210325][T11030] ksys_write+0x14f/0x290 [ 283.214664][T11030] ? __ia32_sys_read+0xb0/0xb0 [ 283.219447][T11030] ? do_syscall_64+0x26/0x790 [ 283.224143][T11030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.230218][T11030] ? do_syscall_64+0x26/0x790 [ 283.234910][T11030] __x64_sys_write+0x73/0xb0 [ 283.239519][T11030] do_syscall_64+0xfa/0x790 [ 283.244045][T11030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.249941][T11030] RIP: 0033:0x45a639 [ 283.253835][T11030] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.253842][T11030] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 283.253855][T11030] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 283.253862][T11030] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 283.253870][T11030] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.253877][T11030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 283.253885][T11030] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 14:55:46 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:46 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(r0) 14:55:46 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000006200), &(0x7f0000007840)=0x10) 14:55:46 executing program 4 (fault-call:9 fault-nth:5): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:46 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 286.005256][T11069] FAULT_INJECTION: forcing a failure. [ 286.005256][T11069] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 286.024890][T11069] CPU: 0 PID: 11069 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 286.034841][T11069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.044913][T11069] Call Trace: [ 286.048253][T11069] dump_stack+0x197/0x210 [ 286.052617][T11069] should_fail.cold+0xa/0x15 [ 286.057238][T11069] ? fault_create_debugfs_attr+0x180/0x180 [ 286.063065][T11069] ? ___might_sleep+0x163/0x2c0 [ 286.067947][T11069] should_fail_alloc_page+0x50/0x60 [ 286.073184][T11069] __alloc_pages_nodemask+0x1a1/0x910 [ 286.078585][T11069] ? __alloc_pages_slowpath+0x2900/0x2900 [ 286.084322][T11069] ? find_get_entry+0x4c4/0x920 [ 286.089187][T11069] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 286.095446][T11069] alloc_pages_current+0x107/0x210 [ 286.100572][T11069] __page_cache_alloc+0x29d/0x490 14:55:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(r1) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, 0x0) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) gettid() bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) close(0xffffffffffffffff) recvmsg(0xffffffffffffffff, 0x0, 0x0) close(r0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 14:55:46 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 286.105635][T11069] pagecache_get_page+0x286/0xb00 [ 286.110682][T11069] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.116949][T11069] grab_cache_page_write_begin+0x75/0xb0 [ 286.122628][T11069] simple_write_begin+0x36/0x2d0 [ 286.122649][T11069] generic_perform_write+0x23b/0x540 [ 286.122676][T11069] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 286.122689][T11069] ? current_time+0x110/0x110 [ 286.122715][T11069] ? __kasan_check_write+0x14/0x20 [ 286.150754][T11069] ? down_write+0xdf/0x150 [ 286.150781][T11069] __generic_file_write_iter+0x25e/0x630 [ 286.150803][T11069] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 286.166827][T11069] generic_file_write_iter+0x420/0x68e [ 286.172318][T11069] ? __generic_file_write_iter+0x630/0x630 [ 286.178150][T11069] ? __kasan_check_read+0x11/0x20 [ 286.183181][T11069] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.183198][T11069] ? iov_iter_init+0xee/0x220 [ 286.183216][T11069] new_sync_write+0x4d3/0x770 [ 286.183237][T11069] ? new_sync_read+0x800/0x800 14:55:46 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 286.203658][T11069] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 286.209847][T11069] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 286.215157][T11069] __vfs_write+0xe1/0x110 [ 286.219508][T11069] vfs_write+0x268/0x5d0 [ 286.223767][T11069] ksys_write+0x14f/0x290 [ 286.223786][T11069] ? __ia32_sys_read+0xb0/0xb0 [ 286.223802][T11069] ? do_syscall_64+0x26/0x790 [ 286.223820][T11069] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.223832][T11069] ? do_syscall_64+0x26/0x790 [ 286.223849][T11069] __x64_sys_write+0x73/0xb0 14:55:46 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) close(r0) [ 286.223864][T11069] do_syscall_64+0xfa/0x790 [ 286.223884][T11069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.223894][T11069] RIP: 0033:0x45a639 [ 286.223912][T11069] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.252935][T11069] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 286.252951][T11069] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 14:55:46 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) close(r0) [ 286.252959][T11069] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 286.252968][T11069] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.252977][T11069] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 286.252986][T11069] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 286.295812][ C0] protocol 88fb is buggy, dev hsr_slave_0 14:55:46 executing program 4 (fault-call:9 fault-nth:6): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:46 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) close(r0) [ 286.543150][T11098] FAULT_INJECTION: forcing a failure. [ 286.543150][T11098] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 286.558096][T11098] CPU: 1 PID: 11098 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 286.568031][T11098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.568037][T11098] Call Trace: [ 286.568064][T11098] dump_stack+0x197/0x210 [ 286.568088][T11098] should_fail.cold+0xa/0x15 [ 286.568107][T11098] ? fault_create_debugfs_attr+0x180/0x180 [ 286.568123][T11098] ? ___might_sleep+0x163/0x2c0 [ 286.568147][T11098] should_fail_alloc_page+0x50/0x60 [ 286.568163][T11098] __alloc_pages_nodemask+0x1a1/0x910 [ 286.568182][T11098] ? __alloc_pages_slowpath+0x2900/0x2900 [ 286.568199][T11098] ? find_get_entry+0x4c4/0x920 [ 286.568216][T11098] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 286.568232][T11098] alloc_pages_current+0x107/0x210 [ 286.568252][T11098] __page_cache_alloc+0x29d/0x490 [ 286.568271][T11098] pagecache_get_page+0x286/0xb00 [ 286.568292][T11098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.608208][T11098] grab_cache_page_write_begin+0x75/0xb0 [ 286.657523][T11098] simple_write_begin+0x36/0x2d0 [ 286.662490][T11098] generic_perform_write+0x23b/0x540 [ 286.667889][T11098] ? timestamp_truncate+0x2f0/0x2f0 [ 286.673139][T11098] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 286.681215][T11098] ? current_time+0x110/0x110 [ 286.685914][T11098] ? __kasan_check_write+0x14/0x20 [ 286.685929][T11098] ? down_write+0xdf/0x150 [ 286.685949][T11098] __generic_file_write_iter+0x25e/0x630 [ 286.685964][T11098] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 286.685983][T11098] generic_file_write_iter+0x420/0x68e [ 286.712578][T11098] ? __generic_file_write_iter+0x630/0x630 [ 286.718426][T11098] ? __kasan_check_read+0x11/0x20 [ 286.723474][T11098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.729735][T11098] ? iov_iter_init+0xee/0x220 [ 286.734419][T11098] new_sync_write+0x4d3/0x770 [ 286.739200][T11098] ? new_sync_read+0x800/0x800 [ 286.744116][T11098] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 286.750296][T11098] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 286.755609][T11098] __vfs_write+0xe1/0x110 [ 286.759954][T11098] vfs_write+0x268/0x5d0 [ 286.764214][T11098] ksys_write+0x14f/0x290 [ 286.768662][T11098] ? __ia32_sys_read+0xb0/0xb0 [ 286.773440][T11098] ? do_syscall_64+0x26/0x790 [ 286.778142][T11098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.784322][T11098] ? do_syscall_64+0x26/0x790 [ 286.789032][T11098] __x64_sys_write+0x73/0xb0 14:55:47 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:47 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(0xffffffffffffffff) [ 286.793640][T11098] do_syscall_64+0xfa/0x790 [ 286.793663][T11098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.793679][T11098] RIP: 0033:0x45a639 [ 286.804100][T11098] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.804109][T11098] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:55:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:47 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(0xffffffffffffffff) [ 286.804125][T11098] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 286.804133][T11098] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 286.804142][T11098] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.804149][T11098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 286.804156][T11098] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 286.828283][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 286.828340][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:55:47 executing program 4 (fault-call:9 fault-nth:7): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) [ 287.107268][T11120] FAULT_INJECTION: forcing a failure. [ 287.107268][T11120] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 287.120741][T11120] CPU: 1 PID: 11120 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 287.130652][T11120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.140713][T11120] Call Trace: [ 287.144170][T11120] dump_stack+0x197/0x210 [ 287.148501][T11120] should_fail.cold+0xa/0x15 [ 287.153089][T11120] ? fault_create_debugfs_attr+0x180/0x180 [ 287.158903][T11120] ? ___might_sleep+0x163/0x2c0 [ 287.163754][T11120] should_fail_alloc_page+0x50/0x60 [ 287.169031][T11120] __alloc_pages_nodemask+0x1a1/0x910 [ 287.174403][T11120] ? __alloc_pages_slowpath+0x2900/0x2900 [ 287.180120][T11120] ? find_get_entry+0x4c4/0x920 [ 287.184962][T11120] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 287.191200][T11120] alloc_pages_current+0x107/0x210 [ 287.196308][T11120] __page_cache_alloc+0x29d/0x490 [ 287.201666][T11120] pagecache_get_page+0x286/0xb00 [ 287.206677][T11120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.212905][T11120] grab_cache_page_write_begin+0x75/0xb0 [ 287.218629][T11120] simple_write_begin+0x36/0x2d0 [ 287.223567][T11120] generic_perform_write+0x23b/0x540 [ 287.228859][T11120] ? timestamp_truncate+0x2f0/0x2f0 [ 287.234109][T11120] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 287.242227][T11120] ? current_time+0x110/0x110 [ 287.247028][T11120] ? __kasan_check_write+0x14/0x20 [ 287.252186][T11120] ? down_write+0xdf/0x150 [ 287.256609][T11120] __generic_file_write_iter+0x25e/0x630 [ 287.262235][T11120] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 287.267958][T11120] generic_file_write_iter+0x420/0x68e [ 287.273419][T11120] ? __generic_file_write_iter+0x630/0x630 [ 287.279359][T11120] ? __kasan_check_read+0x11/0x20 [ 287.284805][T11120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 287.291086][T11120] ? iov_iter_init+0xee/0x220 [ 287.295832][T11120] new_sync_write+0x4d3/0x770 [ 287.300516][T11120] ? new_sync_read+0x800/0x800 [ 287.305284][T11120] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 287.311440][T11120] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 287.316725][T11120] __vfs_write+0xe1/0x110 [ 287.321043][T11120] vfs_write+0x268/0x5d0 [ 287.325274][T11120] ksys_write+0x14f/0x290 [ 287.329610][T11120] ? __ia32_sys_read+0xb0/0xb0 [ 287.334369][T11120] ? do_syscall_64+0x26/0x790 [ 287.339117][T11120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.345192][T11120] ? do_syscall_64+0x26/0x790 [ 287.349865][T11120] __x64_sys_write+0x73/0xb0 [ 287.354446][T11120] do_syscall_64+0xfa/0x790 [ 287.358943][T11120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.364818][T11120] RIP: 0033:0x45a639 [ 287.368722][T11120] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.388410][T11120] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 287.396824][T11120] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 14:55:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 14:55:47 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r0, &(0x7f0000000140)={'\ayz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\f\x00\x00\xfe\xff\xff\xff\x05\xff\xff\xff\x92\xc0\x00\x00\x05\x00'}, 0x45c) close(0xffffffffffffffff) [ 287.404782][T11120] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 287.412928][T11120] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 287.421146][T11120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 287.429117][T11120] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 287.568606][T11127] bond0: (slave bond_slave_1): Releasing backup interface 14:55:49 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:49 executing program 4 (fault-call:9 fault-nth:8): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:49 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x4000) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0600000000008100000086dd60b409000003000002024300800080000000ffffe0000022ff0200000000000000000000000000013c00900700000000000000fa0000000000000000000000000000ffffffffff6df9c9af1ce34edea1c9f7ff000000090000000023d2798cfedba5280000ffffac14ffbb"], 0x0) 14:55:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 14:55:49 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) write$binfmt_aout(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/1017], 0x3f9) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 14:55:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) [ 289.512254][T11144] FAULT_INJECTION: forcing a failure. [ 289.512254][T11144] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 289.563259][T11144] CPU: 1 PID: 11144 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 289.573219][T11144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.583289][T11144] Call Trace: [ 289.586642][T11144] dump_stack+0x197/0x210 [ 289.591015][T11144] should_fail.cold+0xa/0x15 [ 289.595815][T11144] ? fault_create_debugfs_attr+0x180/0x180 [ 289.601682][T11144] ? ___might_sleep+0x163/0x2c0 [ 289.606680][T11144] should_fail_alloc_page+0x50/0x60 [ 289.612078][T11144] __alloc_pages_nodemask+0x1a1/0x910 [ 289.617568][T11144] ? __alloc_pages_slowpath+0x2900/0x2900 [ 289.623319][T11144] ? find_get_entry+0x4c4/0x920 [ 289.628201][T11144] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 289.634463][T11144] alloc_pages_current+0x107/0x210 [ 289.639599][T11144] __page_cache_alloc+0x29d/0x490 [ 289.644647][T11144] pagecache_get_page+0x286/0xb00 [ 289.649699][T11144] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.655967][T11144] grab_cache_page_write_begin+0x75/0xb0 [ 289.661631][T11144] simple_write_begin+0x36/0x2d0 [ 289.666605][T11144] generic_perform_write+0x23b/0x540 [ 289.672014][T11144] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 289.680100][T11144] ? current_time+0x110/0x110 [ 289.684808][T11144] ? __kasan_check_write+0x14/0x20 [ 289.689939][T11144] ? down_write+0xdf/0x150 [ 289.694385][T11144] __generic_file_write_iter+0x25e/0x630 [ 289.700033][T11144] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 289.705780][T11144] generic_file_write_iter+0x420/0x68e [ 289.711259][T11144] ? __generic_file_write_iter+0x630/0x630 [ 289.717178][T11144] ? __kasan_check_read+0x11/0x20 [ 289.722217][T11144] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 289.728509][T11144] ? iov_iter_init+0xee/0x220 [ 289.733209][T11144] new_sync_write+0x4d3/0x770 [ 289.737918][T11144] ? new_sync_read+0x800/0x800 [ 289.742736][T11144] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 289.748924][T11144] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 289.754247][T11144] __vfs_write+0xe1/0x110 [ 289.758600][T11144] vfs_write+0x268/0x5d0 [ 289.762865][T11144] ksys_write+0x14f/0x290 [ 289.767254][T11144] ? __ia32_sys_read+0xb0/0xb0 [ 289.772035][T11144] ? do_syscall_64+0x26/0x790 [ 289.776729][T11144] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.782821][T11144] ? do_syscall_64+0x26/0x790 [ 289.787529][T11144] __x64_sys_write+0x73/0xb0 [ 289.792155][T11144] do_syscall_64+0xfa/0x790 [ 289.796686][T11144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.802600][T11144] RIP: 0033:0x45a639 [ 289.806720][T11144] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.826558][T11144] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 289.834992][T11144] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 289.844811][T11144] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 289.852802][T11144] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 289.860794][T11144] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 289.868779][T11144] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 289.883484][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 289.889306][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 289.895273][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 289.901063][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:55:50 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x4000) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0600000000008100000086dd60b409000003000002024300800080000000ffffe0000022ff0200000000000000000000000000013c00900700000000000000fa0000000000000000000000000000ffffffffff6df9c9af1ce34edea1c9f7ff000000090000000023d2798cfedba5280000ffffac14ffbb"], 0x0) 14:55:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) 14:55:50 executing program 4 (fault-call:9 fault-nth:9): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="39bb0b511274e635fdd6bd31fde48767de9d747e1077767de7b1737c08d9313bc7502af9d25dc21c79b66a69eaff6821667359e2c82b52508b15337bdceada31c6cbe4f240ce5b925ca7ef52a53837cd0303739dfe0a6930e654638e6f3fd5963b49ba6b0770f5b92502005324eaa5c28fb6a8fa2b3642b22ddfc5831d000a941b32f518bdd985f8e72b8a31c4bf2342925a95762ee86d80c01e80194b85e2007380d387da1d949975f478e6ccc13338de14dc94de41105dd7519f11c286b9dcbda2a0b393adcf2d2a1b85434ab0ea3288a9801f867b95a3e95af30264ab95cd9b92274f", 0xe4}], 0x1, &(0x7f0000000540)=[@txtime={{0x18, 0x1, 0x3d, 0x7f}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x7488}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}], 0x60}}], 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') setgroups(0x54b, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r3, &(0x7f0000000000), 0x1c) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x1d) fcntl$getflags(0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) bind$packet(r4, &(0x7f0000000300), 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) [ 290.216792][T11163] FAULT_INJECTION: forcing a failure. [ 290.216792][T11163] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 290.264856][T11163] CPU: 0 PID: 11163 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 290.274804][T11163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.284879][T11163] Call Trace: [ 290.288193][T11163] dump_stack+0x197/0x210 [ 290.292551][T11163] should_fail.cold+0xa/0x15 [ 290.297173][T11163] ? fault_create_debugfs_attr+0x180/0x180 [ 290.303007][T11163] ? ___might_sleep+0x163/0x2c0 [ 290.307883][T11163] should_fail_alloc_page+0x50/0x60 [ 290.313106][T11163] __alloc_pages_nodemask+0x1a1/0x910 [ 290.318501][T11163] ? __alloc_pages_slowpath+0x2900/0x2900 [ 290.324410][T11163] ? find_get_entry+0x4c4/0x920 [ 290.329393][T11163] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 290.335654][T11163] alloc_pages_current+0x107/0x210 [ 290.340802][T11163] __page_cache_alloc+0x29d/0x490 [ 290.345846][T11163] pagecache_get_page+0x286/0xb00 [ 290.350967][T11163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.357232][T11163] grab_cache_page_write_begin+0x75/0xb0 [ 290.362853][T11163] simple_write_begin+0x36/0x2d0 [ 290.367778][T11163] generic_perform_write+0x23b/0x540 [ 290.373071][T11163] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 290.381129][T11163] ? current_time+0x110/0x110 [ 290.385794][T11163] ? __kasan_check_write+0x14/0x20 [ 290.390891][T11163] ? down_write+0xdf/0x150 [ 290.398611][T11163] __generic_file_write_iter+0x25e/0x630 [ 290.404230][T11163] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 290.410282][T11163] generic_file_write_iter+0x420/0x68e [ 290.415732][T11163] ? __generic_file_write_iter+0x630/0x630 [ 290.421529][T11163] ? __kasan_check_read+0x11/0x20 [ 290.426540][T11163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 290.432777][T11163] ? iov_iter_init+0xee/0x220 [ 290.437474][T11163] new_sync_write+0x4d3/0x770 [ 290.442141][T11163] ? new_sync_read+0x800/0x800 [ 290.446899][T11163] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 290.453131][T11163] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 290.458438][T11163] __vfs_write+0xe1/0x110 [ 290.462767][T11163] vfs_write+0x268/0x5d0 [ 290.467004][T11163] ksys_write+0x14f/0x290 [ 290.471344][T11163] ? __ia32_sys_read+0xb0/0xb0 [ 290.476106][T11163] ? do_syscall_64+0x26/0x790 [ 290.480781][T11163] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.486835][T11163] ? do_syscall_64+0x26/0x790 [ 290.491504][T11163] __x64_sys_write+0x73/0xb0 [ 290.496086][T11163] do_syscall_64+0xfa/0x790 [ 290.500580][T11163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.506542][T11163] RIP: 0033:0x45a639 [ 290.510432][T11163] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.530050][T11163] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 290.538459][T11163] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 290.546512][T11163] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 290.554483][T11163] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 290.562804][T11163] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 290.570758][T11163] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 290.579064][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 290.584932][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 290.590811][ C0] protocol 88fb is buggy, dev hsr_slave_0 14:55:52 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:52 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote}, 0xa5bbb1179627e99) 14:55:52 executing program 4 (fault-call:9 fault-nth:10): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 292.703137][T11191] FAULT_INJECTION: forcing a failure. [ 292.703137][T11191] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 292.719428][T11191] CPU: 1 PID: 11191 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 292.729356][T11191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.739421][T11191] Call Trace: [ 292.742731][T11191] dump_stack+0x197/0x210 [ 292.747079][T11191] should_fail.cold+0xa/0x15 [ 292.751774][T11191] ? fault_create_debugfs_attr+0x180/0x180 [ 292.757595][T11191] ? ___might_sleep+0x163/0x2c0 [ 292.762464][T11191] should_fail_alloc_page+0x50/0x60 [ 292.767719][T11191] __alloc_pages_nodemask+0x1a1/0x910 [ 292.773107][T11191] ? __alloc_pages_slowpath+0x2900/0x2900 [ 292.778854][T11191] ? find_get_entry+0x4c4/0x920 [ 292.783722][T11191] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 292.789995][T11191] alloc_pages_current+0x107/0x210 [ 292.795132][T11191] __page_cache_alloc+0x29d/0x490 [ 292.800163][T11191] ? __asan_set_shadow_f8+0x20/0x20 [ 292.805407][T11191] pagecache_get_page+0x286/0xb00 [ 292.810454][T11191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.816703][T11191] grab_cache_page_write_begin+0x75/0xb0 [ 292.822344][T11191] simple_write_begin+0x36/0x2d0 [ 292.827289][T11191] generic_perform_write+0x23b/0x540 [ 292.832667][T11191] ? timestamp_truncate+0x2f0/0x2f0 [ 292.837885][T11191] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 292.845958][T11191] ? current_time+0x110/0x110 [ 292.850747][T11191] ? __kasan_check_write+0x14/0x20 [ 292.855868][T11191] ? down_write+0xdf/0x150 [ 292.860295][T11191] __generic_file_write_iter+0x25e/0x630 [ 292.865957][T11191] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 292.871688][T11191] generic_file_write_iter+0x420/0x68e [ 292.877180][T11191] ? __generic_file_write_iter+0x630/0x630 [ 292.882995][T11191] ? __kasan_check_read+0x11/0x20 [ 292.888023][T11191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.894386][T11191] ? iov_iter_init+0xee/0x220 [ 292.899268][T11191] new_sync_write+0x4d3/0x770 [ 292.903950][T11191] ? new_sync_read+0x800/0x800 [ 292.908774][T11191] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 292.914964][T11191] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 292.920241][T11191] __vfs_write+0xe1/0x110 [ 292.924561][T11191] vfs_write+0x268/0x5d0 [ 292.928815][T11191] ksys_write+0x14f/0x290 [ 292.933135][T11191] ? __ia32_sys_read+0xb0/0xb0 [ 292.938015][T11191] ? do_syscall_64+0x26/0x790 [ 292.942693][T11191] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.948752][T11191] ? do_syscall_64+0x26/0x790 [ 292.953516][T11191] __x64_sys_write+0x73/0xb0 [ 292.958136][T11191] do_syscall_64+0xfa/0x790 [ 292.962747][T11191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.968915][T11191] RIP: 0033:0x45a639 [ 292.972818][T11191] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.992614][T11191] RSP: 002b:00007fd822ff0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 293.001199][T11191] RAX: ffffffffffffffda RBX: 00007fd822ff0c90 RCX: 000000000045a639 [ 293.003580][ C0] net_ratelimit: 1 callbacks suppressed [ 293.003588][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 293.009157][T11191] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 293.009165][T11191] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 293.009173][T11191] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd822ff16d4 [ 293.009182][T11191] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 293.053192][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 293.243563][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 293.249405][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 293.675333][T11169] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.683535][T11169] bridge0: port 1(bridge_slave_0) entered disabled state 14:55:56 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:56 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:56 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:56 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:55:56 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:55:56 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:55:58 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:58 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="39bb0b511274e635fdd6bd31fde48767de9d747e1077767de7b1737c08d9313bc7502af9d25dc21c79b66a69eaff6821667359e2c82b52508b15337bdceada31c6cbe4f240ce5b925ca7ef52a53837cd0303739dfe0a6930e654638e6f3fd5963b49ba6b0770f5b92502005324eaa5c28fb6a8fa2b3642b22ddfc5831d000a941b32f518bdd985f8e72b8a31c4bf2342925a95762ee86d80c01e80194b85e2007380d387da1d949975f478e6ccc13338de14dc94de41105dd7519f11c286b9dcbda2a0b393adcf2d2a1b85434ab0ea3288a9801f867b95a3e95af30264ab95cd9b92274f", 0xe4}], 0x1, &(0x7f0000000540)=[@txtime={{0x18, 0x1, 0x3d, 0x7f}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x7488}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}], 0x60}}], 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') setgroups(0x54b, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r3, &(0x7f0000000000), 0x1c) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x1d) fcntl$getflags(0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) bind$packet(r4, &(0x7f0000000300), 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) 14:55:58 executing program 3: 14:55:58 executing program 4 (fault-call:9 fault-nth:11): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:58 executing program 3: 14:55:58 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:58 executing program 3: [ 298.692289][T11239] FAULT_INJECTION: forcing a failure. [ 298.692289][T11239] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 298.719141][T11239] CPU: 1 PID: 11239 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 298.729554][T11239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.739624][T11239] Call Trace: [ 298.742938][T11239] dump_stack+0x197/0x210 [ 298.747306][T11239] should_fail.cold+0xa/0x15 [ 298.751925][T11239] ? fault_create_debugfs_attr+0x180/0x180 [ 298.757775][T11239] ? ___might_sleep+0x163/0x2c0 [ 298.762661][T11239] should_fail_alloc_page+0x50/0x60 [ 298.767901][T11239] __alloc_pages_nodemask+0x1a1/0x910 [ 298.767928][T11239] ? __alloc_pages_slowpath+0x2900/0x2900 [ 298.767949][T11239] ? find_get_entry+0x4c4/0x920 [ 298.767969][T11239] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 298.767987][T11239] alloc_pages_current+0x107/0x210 [ 298.768010][T11239] __page_cache_alloc+0x29d/0x490 [ 298.800312][T11239] pagecache_get_page+0x286/0xb00 [ 298.805354][T11239] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.811622][T11239] grab_cache_page_write_begin+0x75/0xb0 [ 298.817278][T11239] simple_write_begin+0x36/0x2d0 [ 298.822240][T11239] generic_perform_write+0x23b/0x540 [ 298.827546][T11239] ? timestamp_truncate+0x2f0/0x2f0 [ 298.832775][T11239] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 298.840874][T11239] ? current_time+0x110/0x110 [ 298.843505][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 298.845569][T11239] ? __kasan_check_write+0x14/0x20 [ 298.845591][T11239] ? down_write+0xdf/0x150 [ 298.851510][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 298.856568][T11239] __generic_file_write_iter+0x25e/0x630 [ 298.856583][T11239] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 298.856600][T11239] generic_file_write_iter+0x420/0x68e [ 298.856619][T11239] ? __generic_file_write_iter+0x630/0x630 [ 298.861100][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 298.866717][T11239] ? __kasan_check_read+0x11/0x20 [ 298.866732][T11239] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.866753][T11239] ? iov_iter_init+0xee/0x220 [ 298.872397][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 298.878072][T11239] new_sync_write+0x4d3/0x770 [ 298.878089][T11239] ? new_sync_read+0x800/0x800 [ 298.878112][T11239] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 298.895072][T11239] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 298.895094][T11239] __vfs_write+0xe1/0x110 14:55:59 executing program 3: 14:55:59 executing program 3: 14:55:59 executing program 3: [ 298.895110][T11239] vfs_write+0x268/0x5d0 [ 298.895127][T11239] ksys_write+0x14f/0x290 [ 298.895151][T11239] ? __ia32_sys_read+0xb0/0xb0 [ 298.906413][T11239] ? do_syscall_64+0x26/0x790 [ 298.906435][T11239] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.906450][T11239] ? do_syscall_64+0x26/0x790 [ 298.906471][T11239] __x64_sys_write+0x73/0xb0 [ 298.906490][T11239] do_syscall_64+0xfa/0x790 [ 298.979991][T11239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.985998][T11239] RIP: 0033:0x45a639 [ 298.986013][T11239] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.986020][T11239] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 298.986033][T11239] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 298.986040][T11239] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 298.986047][T11239] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 298.986060][T11239] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 299.009565][T11239] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 14:55:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="39bb0b511274e635fdd6bd31fde48767de9d747e1077767de7b1737c08d9313bc7502af9d25dc21c79b66a69eaff6821667359e2c82b52508b15337bdceada31c6cbe4f240ce5b925ca7ef52a53837cd0303739dfe0a6930e654638e6f3fd5963b49ba6b0770f5b92502005324eaa5c28fb6a8fa2b3642b22ddfc5831d000a941b32f518bdd985f8e72b8a31c4bf2342925a95762ee86d80c01e80194b85e2007380d387da1d949975f478e6ccc13338de14dc94de41105dd7519f11c286b9dcbda2a0b393adcf2d2a1b85434ab0ea3288a9801f867b95a3e95af30264ab95cd9b92274f", 0xe4}], 0x1, &(0x7f0000000540)=[@txtime={{0x18, 0x1, 0x3d, 0x7f}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x7488}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}], 0x60}}], 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') setgroups(0x54b, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r3, &(0x7f0000000000), 0x1c) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x1d) fcntl$getflags(0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) bind$packet(r4, &(0x7f0000000300), 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) 14:55:59 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200"], 0x10) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(0x0, 0x0, 0x0) fchdir(r3) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) fchdir(0xffffffffffffffff) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff8756ea"], 0x3e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:55:59 executing program 4 (fault-call:9 fault-nth:12): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:55:59 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:59 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:55:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:55:59 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:55:59 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 299.486165][T11270] ptrace attach of "/root/syz-executor.1"[11269] was attempted by "/root/syz-executor.1"[11270] 14:55:59 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) io_setup(0x5, &(0x7f0000000180)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 299.526454][T11275] ptrace attach of "/root/syz-executor.1"[11274] was attempted by "/root/syz-executor.1"[11275] [ 299.558071][T11263] FAULT_INJECTION: forcing a failure. [ 299.558071][T11263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:55:59 executing program 1: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 299.569581][T11278] ptrace attach of "/root/syz-executor.1"[11277] was attempted by "/root/syz-executor.1"[11278] [ 299.649897][T11263] CPU: 1 PID: 11263 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 299.659846][T11263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.669922][T11263] Call Trace: [ 299.673244][T11263] dump_stack+0x197/0x210 [ 299.677617][T11263] should_fail.cold+0xa/0x15 [ 299.682591][T11263] ? fault_create_debugfs_attr+0x180/0x180 [ 299.688428][T11263] ? ___might_sleep+0x163/0x2c0 [ 299.693324][T11263] should_fail_alloc_page+0x50/0x60 [ 299.698551][T11263] __alloc_pages_nodemask+0x1a1/0x910 [ 299.703958][T11263] ? __alloc_pages_slowpath+0x2900/0x2900 [ 299.709888][T11263] ? find_get_entry+0x4c4/0x920 [ 299.714958][T11263] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 299.721240][T11263] alloc_pages_current+0x107/0x210 [ 299.726392][T11263] __page_cache_alloc+0x29d/0x490 [ 299.731447][T11263] pagecache_get_page+0x286/0xb00 [ 299.734848][T11268] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 299.736496][T11263] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.736519][T11263] grab_cache_page_write_begin+0x75/0xb0 [ 299.736541][T11263] simple_write_begin+0x36/0x2d0 [ 299.736559][T11263] generic_perform_write+0x23b/0x540 [ 299.736587][T11263] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 299.745704][T11268] FAT-fs (loop3): Filesystem has been set read-only [ 299.751652][T11263] ? current_time+0x110/0x110 [ 299.751671][T11263] ? __kasan_check_write+0x14/0x20 [ 299.751689][T11263] ? down_write+0xdf/0x150 [ 299.751710][T11263] __generic_file_write_iter+0x25e/0x630 [ 299.751727][T11263] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 299.751747][T11263] generic_file_write_iter+0x420/0x68e [ 299.751763][T11263] ? __generic_file_write_iter+0x630/0x630 [ 299.751783][T11263] ? __kasan_check_read+0x11/0x20 [ 299.757933][T11268] FAT-fs (loop3): error, fat_free_clusters: deleting FAT entry beyond EOF [ 299.762323][T11263] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.762340][T11263] ? iov_iter_init+0xee/0x220 [ 299.762361][T11263] new_sync_write+0x4d3/0x770 [ 299.762381][T11263] ? new_sync_read+0x800/0x800 [ 299.762405][T11263] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 299.762433][T11263] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 299.850598][T11257] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 299.853388][T11263] __vfs_write+0xe1/0x110 [ 299.853409][T11263] vfs_write+0x268/0x5d0 [ 299.853431][T11263] ksys_write+0x14f/0x290 [ 299.853448][T11263] ? __ia32_sys_read+0xb0/0xb0 [ 299.853465][T11263] ? do_syscall_64+0x26/0x790 14:56:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) fcntl$dupfd(r1, 0x0, r0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="39bb0b511274e635fdd6bd31fde48767de9d747e1077767de7b1737c08d9313bc7502af9d25dc21c79b66a69eaff6821667359e2c82b52508b15337bdceada31c6cbe4f240ce5b925ca7ef52a53837cd0303739dfe0a6930e654638e6f3fd5963b49ba6b0770f5b92502005324eaa5c28fb6a8fa2b3642b22ddfc5831d000a941b32f518bdd985f8e72b8a31c4bf2342925a95762ee86d80c01e80194b85e2007380d387da1d949975f478e6ccc13338de14dc94de41105dd7519f11c286b9dcbda2a0b393adcf2d2a1b85434ab0ea3288a9801f867b95a3e95af30264ab95cd9b92274f", 0xe4}], 0x1, &(0x7f0000000540)=[@txtime={{0x18, 0x1, 0x3d, 0x7f}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x7488}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffc0}}], 0x60}}], 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3KU\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#,I\xee\x06\xd1\xad\xd2_\xa7\xf7U\xe1\x00O\xbc\x01\x93K\xc7\x99[\xf2\x87\x97\x86;\xbb\xca\xc0\x1c\xe05\xf6n\xc3\xa9\x83{xe\xdd\xc1\xe3!\xccS^\x9b\xc5\xe7\b\xad\xce') setgroups(0x54b, &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r3, &(0x7f0000000000), 0x1c) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2007fff) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x1d) fcntl$getflags(0xffffffffffffffff, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) bind$packet(r4, &(0x7f0000000300), 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl(0xffffffffffffffff, 0x80000000008936, &(0x7f0000000000)) [ 299.853483][T11263] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.853494][T11263] ? do_syscall_64+0x26/0x790 [ 299.853512][T11263] __x64_sys_write+0x73/0xb0 [ 299.860113][T11257] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 299.864929][T11263] do_syscall_64+0xfa/0x790 [ 299.864954][T11263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.864966][T11263] RIP: 0033:0x45a639 [ 299.864982][T11263] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.864990][T11263] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 299.865003][T11263] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 299.865010][T11263] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 299.865017][T11263] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.865025][T11263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 299.865032][T11263] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 14:56:00 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200"], 0x10) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(0x0, 0x0, 0x0) fchdir(r3) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) fchdir(0xffffffffffffffff) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff8756ea"], 0x3e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:00 executing program 4 (fault-call:9 fault-nth:13): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:56:00 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 300.488989][T11296] FAULT_INJECTION: forcing a failure. [ 300.488989][T11296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:56:00 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 300.580769][T11296] CPU: 0 PID: 11296 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 300.590716][T11296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.600785][T11296] Call Trace: [ 300.604116][T11296] dump_stack+0x197/0x210 [ 300.608580][T11296] should_fail.cold+0xa/0x15 [ 300.613219][T11296] ? fault_create_debugfs_attr+0x180/0x180 [ 300.619060][T11296] ? ___might_sleep+0x163/0x2c0 [ 300.623965][T11296] should_fail_alloc_page+0x50/0x60 [ 300.629191][T11296] __alloc_pages_nodemask+0x1a1/0x910 [ 300.634593][T11296] ? __alloc_pages_slowpath+0x2900/0x2900 [ 300.640369][T11296] ? find_get_entry+0x4c4/0x920 [ 300.645246][T11296] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 300.651514][T11296] alloc_pages_current+0x107/0x210 [ 300.656657][T11296] __page_cache_alloc+0x29d/0x490 [ 300.661730][T11296] pagecache_get_page+0x286/0xb00 [ 300.666785][T11296] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.673167][T11296] grab_cache_page_write_begin+0x75/0xb0 [ 300.678830][T11296] simple_write_begin+0x36/0x2d0 [ 300.683803][T11296] generic_perform_write+0x23b/0x540 [ 300.689123][T11296] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 300.697219][T11296] ? current_time+0x110/0x110 [ 300.701922][T11296] ? __kasan_check_write+0x14/0x20 [ 300.707065][T11296] ? down_write+0xdf/0x150 [ 300.711509][T11296] __generic_file_write_iter+0x25e/0x630 [ 300.717169][T11296] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 300.722931][T11296] generic_file_write_iter+0x420/0x68e [ 300.728415][T11296] ? __generic_file_write_iter+0x630/0x630 [ 300.734243][T11296] ? __kasan_check_read+0x11/0x20 [ 300.739291][T11296] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.745585][T11296] ? iov_iter_init+0xee/0x220 [ 300.750301][T11296] new_sync_write+0x4d3/0x770 [ 300.755003][T11296] ? new_sync_read+0x800/0x800 [ 300.759803][T11296] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 300.765990][T11296] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 300.771306][T11296] __vfs_write+0xe1/0x110 [ 300.775782][T11296] vfs_write+0x268/0x5d0 [ 300.780059][T11296] ksys_write+0x14f/0x290 [ 300.784529][T11296] ? __ia32_sys_read+0xb0/0xb0 [ 300.789345][T11296] ? do_syscall_64+0x26/0x790 [ 300.794047][T11296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.800141][T11296] ? do_syscall_64+0x26/0x790 [ 300.804848][T11296] __x64_sys_write+0x73/0xb0 [ 300.809461][T11296] do_syscall_64+0xfa/0x790 [ 300.813998][T11296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.819902][T11296] RIP: 0033:0x45a639 [ 300.823816][T11296] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.843437][T11296] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 300.852458][T11296] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 300.860536][T11296] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 300.868525][T11296] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.876507][T11296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 300.884667][T11296] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 14:56:01 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 300.923458][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 300.929330][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 300.935243][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 300.941043][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:56:01 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 301.493699][ T7] tipc: TX() has been purged, node left! 14:56:02 executing program 4 (fault-call:9 fault-nth:14): mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:56:02 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200"], 0x10) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(0x0, 0x0, 0x0) fchdir(r3) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) fchdir(0xffffffffffffffff) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff8756ea"], 0x3e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 301.945616][T11339] FAULT_INJECTION: forcing a failure. [ 301.945616][T11339] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 302.045632][T11339] CPU: 1 PID: 11339 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 302.057509][T11339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.068099][T11339] Call Trace: [ 302.071410][T11339] dump_stack+0x197/0x210 [ 302.075771][T11339] should_fail.cold+0xa/0x15 [ 302.080388][T11339] ? fault_create_debugfs_attr+0x180/0x180 [ 302.086215][T11339] ? ___might_sleep+0x163/0x2c0 [ 302.091100][T11339] should_fail_alloc_page+0x50/0x60 [ 302.096320][T11339] __alloc_pages_nodemask+0x1a1/0x910 [ 302.101716][T11339] ? __alloc_pages_slowpath+0x2900/0x2900 [ 302.109552][T11339] ? find_get_entry+0x4c4/0x920 [ 302.114428][T11339] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 302.120683][T11339] alloc_pages_current+0x107/0x210 [ 302.125816][T11339] __page_cache_alloc+0x29d/0x490 [ 302.130868][T11339] pagecache_get_page+0x286/0xb00 [ 302.135925][T11339] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.142183][T11339] grab_cache_page_write_begin+0x75/0xb0 [ 302.147840][T11339] simple_write_begin+0x36/0x2d0 [ 302.152804][T11339] generic_perform_write+0x23b/0x540 [ 302.158118][T11339] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 302.166220][T11339] ? current_time+0x110/0x110 [ 302.170940][T11339] ? __kasan_check_write+0x14/0x20 [ 302.176156][T11339] ? down_write+0xdf/0x150 [ 302.180592][T11339] __generic_file_write_iter+0x25e/0x630 [ 302.186274][T11339] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 302.192013][T11339] generic_file_write_iter+0x420/0x68e [ 302.197772][T11339] ? __generic_file_write_iter+0x630/0x630 [ 302.203611][T11339] ? __kasan_check_read+0x11/0x20 [ 302.208657][T11339] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.214922][T11339] ? iov_iter_init+0xee/0x220 [ 302.219615][T11339] new_sync_write+0x4d3/0x770 [ 302.224315][T11339] ? new_sync_read+0x800/0x800 [ 302.229099][T11339] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 302.235366][T11339] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 302.245688][T11339] __vfs_write+0xe1/0x110 [ 302.250037][T11339] vfs_write+0x268/0x5d0 [ 302.254305][T11339] ksys_write+0x14f/0x290 [ 302.258666][T11339] ? __ia32_sys_read+0xb0/0xb0 [ 302.263444][T11339] ? do_syscall_64+0x26/0x790 [ 302.268133][T11339] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.274307][T11339] ? do_syscall_64+0x26/0x790 [ 302.279019][T11339] __x64_sys_write+0x73/0xb0 [ 302.283628][T11339] do_syscall_64+0xfa/0x790 [ 302.288153][T11339] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.294060][T11339] RIP: 0033:0x45a639 [ 302.297958][T11339] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.317758][T11339] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 302.326180][T11339] RAX: ffffffffffffffda RBX: 00007fd823011c90 RCX: 000000000045a639 [ 302.334166][T11339] RDX: 000000000000fdef RSI: 0000000020000100 RDI: 0000000000000007 [ 302.342151][T11339] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.350139][T11339] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 302.358121][T11339] R13: 00000000004cb05e R14: 00000000004e3750 R15: 0000000000000009 [ 302.363505][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 302.371889][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:56:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 303.279195][T11356] IPVS: ftp: loaded support on port[0] = 21 [ 303.482715][T11356] chnl_net:caif_netlink_parms(): no params data found [ 303.521803][T11356] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.529122][T11356] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.537355][T11356] device bridge_slave_0 entered promiscuous mode [ 303.548902][T11356] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.556504][T11356] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.564842][T11356] device bridge_slave_1 entered promiscuous mode [ 303.587126][T11356] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 303.598724][T11356] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 303.621541][T11356] team0: Port device team_slave_0 added [ 303.629706][T11356] team0: Port device team_slave_1 added [ 303.687516][T11356] device hsr_slave_0 entered promiscuous mode [ 303.745051][T11356] device hsr_slave_1 entered promiscuous mode [ 303.783532][T11356] debugfs: Directory 'hsr0' with parent '/' already present! [ 303.805407][T11356] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.812524][T11356] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.820021][T11356] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.827169][T11356] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.871258][T11356] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.888162][ T9113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.897866][ T9113] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.907883][ T9113] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.916701][ T9113] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 303.933267][T11356] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.946716][ T9112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.955182][ T9112] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.962238][ T9112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.973534][ T9113] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.981931][ T9113] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.989048][ T9113] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.017239][ T9113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.026775][ T9113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.035658][ T9113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.044381][ T9113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.055347][T11356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.069392][ T9114] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.088151][ T9112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 304.095802][ T9112] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 304.109702][T11356] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.266183][ T7] device bridge_slave_1 left promiscuous mode [ 304.272680][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.328476][ T7] device bridge_slave_0 left promiscuous mode [ 304.341089][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.455220][ T7] device hsr_slave_0 left promiscuous mode [ 304.504446][ T7] device hsr_slave_1 left promiscuous mode [ 304.600900][ T7] team0 (unregistering): Port device team_slave_1 removed [ 304.633122][ T7] team0 (unregistering): Port device team_slave_0 removed [ 304.679657][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 305.021973][ T7] bond0 (unregistering): Released all slaves [ 307.410926][T11373] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.418394][T11373] bridge0: port 1(bridge_slave_0) entered disabled state 14:56:11 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x3f) ptrace$peekuser(0x3, 0x0, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x1c7d9, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) syz_genetlink_get_family_id$nbd(0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, &(0x7f00000002c0)) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) socket(0x0, 0x0, 0x0) 14:56:11 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:11 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200"], 0x10) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) r3 = open(0x0, 0x0, 0x0) fchdir(r3) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) fchdir(0xffffffffffffffff) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff8756ea"], 0x3e) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:11 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:56:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 311.333420][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 311.339297][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 311.345174][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 311.350961][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:56:11 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xf}, 0xfdef) 14:56:11 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)=0x3f) ptrace$peekuser(0x3, 0x0, 0x1) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x1c7d9, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) syz_genetlink_get_family_id$nbd(0x0) creat(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000200), &(0x7f00000002c0)=0x42b) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@dev, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) socket(0x10, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 14:56:11 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x0, 0x4, 0x4, 0x1}, 0x1e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) dup3(r0, r1, 0x0) 14:56:12 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:56:12 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x2}, 0xfdef) 14:56:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:12 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:12 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:12 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x3}, 0xfdef) 14:56:12 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x4}, 0xfdef) 14:56:13 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x5}, 0xfdef) [ 313.234265][T11420] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 313.243080][T11420] FAT-fs (loop3): Filesystem has been set read-only [ 313.250908][T11420] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 313.259648][T11416] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 313.272238][T11416] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 313.767980][T11436] IPVS: ftp: loaded support on port[0] = 21 [ 313.845494][T11436] chnl_net:caif_netlink_parms(): no params data found [ 313.881034][T11436] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.888430][T11436] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.897666][T11436] device bridge_slave_0 entered promiscuous mode [ 313.906331][T11436] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.913618][T11436] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.921489][T11436] device bridge_slave_1 entered promiscuous mode [ 313.946433][T11436] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.959008][T11436] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.982697][T11436] team0: Port device team_slave_0 added [ 313.990833][T11436] team0: Port device team_slave_1 added [ 314.037021][T11436] device hsr_slave_0 entered promiscuous mode [ 314.084747][T11436] device hsr_slave_1 entered promiscuous mode 14:56:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:14 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, 0x0, 0x0) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 314.137055][T11436] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.144310][T11436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.151653][T11436] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.158770][T11436] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.276319][T11436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.295564][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.305904][ T9110] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.315173][ T9110] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.326192][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 314.340054][T11436] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.357094][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.366182][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.373269][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.399555][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.408343][ T9110] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.415652][ T9110] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.427580][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 314.436765][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 314.454687][T11436] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 314.465818][T11436] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 314.478710][ T9112] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 314.491056][ T9112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.499876][ T9112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.508592][ T9112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.537604][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.545858][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.560690][T11436] 8021q: adding VLAN 0 to HW filter on device batadv0 14:56:15 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 14:56:15 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x6}, 0xfdef) 14:56:15 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:15 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, 0x0, 0x0) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:15 executing program 0: 14:56:15 executing program 0: 14:56:15 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x7}, 0xfdef) 14:56:15 executing program 0: [ 315.777059][T11464] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 315.786795][T11464] FAT-fs (loop3): Filesystem has been set read-only [ 315.794919][T11464] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 315.813694][T11480] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 315.822611][T11480] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:17 executing program 0: 14:56:17 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x8}, 0xfdef) 14:56:17 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:17 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, 0x0, 0x0) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:17 executing program 0: 14:56:17 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:17 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x9}, 0xfdef) [ 317.472404][ T7] tipc: TX() has been purged, node left! 14:56:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:18 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xa}, 0xfdef) 14:56:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:18 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xb}, 0xfdef) 14:56:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:18 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:18 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:18 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xc}, 0xfdef) [ 318.967290][T11560] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 318.976818][T11560] FAT-fs (loop3): Filesystem has been set read-only [ 318.986750][T11560] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 319.000934][T11564] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 319.020642][T11564] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 319.604609][ T7] device bridge_slave_1 left promiscuous mode [ 319.610990][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.665542][ T7] device bridge_slave_0 left promiscuous mode [ 319.671826][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.774091][ T7] device hsr_slave_0 left promiscuous mode [ 319.843502][ T7] device hsr_slave_1 left promiscuous mode [ 319.899453][ T7] team0 (unregistering): Port device team_slave_1 removed [ 319.915149][ T7] team0 (unregistering): Port device team_slave_0 removed [ 319.929365][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 319.991783][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 320.119789][ T7] bond0 (unregistering): Released all slaves 14:56:20 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:20 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xd}, 0xfdef) 14:56:20 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x0, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:20 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:21 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xe}, 0xfdef) [ 320.963233][T11585] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 320.972133][T11585] FAT-fs (loop3): Filesystem has been set read-only [ 320.985668][T11585] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:21 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:21 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xf}, 0xfdef) [ 321.004131][T11580] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 321.014695][T11580] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:21 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x10}, 0xfdef) 14:56:21 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 321.610237][T11600] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 321.619724][T11600] FAT-fs (loop3): Filesystem has been set read-only [ 321.627155][T11600] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:23 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x0, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:23 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x300}, 0xfdef) 14:56:23 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:23 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:24 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x408}, 0xfdef) 14:56:24 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x500}, 0xfdef) 14:56:24 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x600}, 0xfdef) [ 324.152070][T11627] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 324.161226][T11627] FAT-fs (loop3): Filesystem has been set read-only [ 324.172375][T11627] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:24 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:24 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x700}, 0xfdef) 14:56:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x0, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 324.443450][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 324.449341][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 324.818978][T11656] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 324.831817][T11656] FAT-fs (loop3): Filesystem has been set read-only [ 324.838691][T11656] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:27 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:27 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:27 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x804}, 0xfdef) 14:56:27 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x0, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:27 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x900}, 0xfdef) 14:56:27 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xa00}, 0xfdef) 14:56:27 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) r5 = open(0x0, 0x0, 0x0) fchdir(r5) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 327.120822][T11688] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 327.136524][T11688] FAT-fs (loop3): Filesystem has been set read-only [ 327.143516][T11688] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 327.152391][T11678] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 327.161925][T11678] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:27 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xb00}, 0xfdef) 14:56:27 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xc00}, 0xfdef) 14:56:27 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 327.677011][T11710] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 327.686146][T11710] FAT-fs (loop3): Filesystem has been set read-only [ 327.693001][T11710] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 327.721142][T11705] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 327.737865][T11705] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:30 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x0, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:30 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xd00}, 0xfdef) 14:56:30 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:30 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:30 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xe00}, 0xfdef) [ 330.040030][T11728] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 330.060341][T11728] FAT-fs (loop3): Filesystem has been set read-only [ 330.074388][T11728] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:30 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 330.082876][T11737] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 330.092474][T11737] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:30 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xf00}, 0xfdef) 14:56:30 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x4000}, 0xfdef) [ 330.450890][T11757] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 330.474472][T11757] FAT-fs (loop3): Filesystem has been set read-only [ 330.482180][T11757] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 330.498261][T11753] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 330.537172][T11753] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:30 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x0, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:33 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:33 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:33 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x100000}, 0xfdef) 14:56:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x0, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:33 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:33 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x1000000}, 0xfdef) [ 333.220370][T11782] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 333.236652][T11782] FAT-fs (loop3): Filesystem has been set read-only [ 333.245902][T11782] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 333.257177][T11792] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 14:56:33 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x2000000}, 0xfdef) [ 333.267595][T11792] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:33 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:33 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x3000000}, 0xfdef) 14:56:34 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x0, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) [ 333.827948][T11813] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 333.844761][T11813] FAT-fs (loop3): Filesystem has been set read-only [ 333.851724][T11813] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 333.860536][T11808] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 333.877167][T11808] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:36 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:36 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x4000000}, 0xfdef) 14:56:36 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:36 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x0, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:36 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:36 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x5000000}, 0xfdef) 14:56:36 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:36 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 336.371794][T11841] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 336.401305][T11841] FAT-fs (loop3): Filesystem has been set read-only 14:56:36 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 336.415661][T11841] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:36 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:36 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x6000000}, 0xfdef) [ 336.458139][T11834] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 336.485051][T11834] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:36 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 336.933328][T11874] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 336.942194][T11874] FAT-fs (loop3): Filesystem has been set read-only [ 336.949083][T11874] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 336.957807][T11872] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 336.971165][T11872] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:39 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:39 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:39 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x7000000}, 0xfdef) 14:56:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) 14:56:39 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:39 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:39 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x8000000}, 0xfdef) 14:56:39 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:39 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:39 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:39 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x8040000}, 0xfdef) 14:56:42 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x9000000}, 0xfdef) 14:56:42 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:42 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x0, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:42 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) 14:56:42 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x0, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:42 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:42 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xa000000}, 0xfdef) 14:56:42 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x0, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:42 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xb000000}, 0xfdef) 14:56:43 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 342.622559][T11941] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 342.631478][T11941] FAT-fs (loop3): Filesystem has been set read-only [ 342.638897][T11941] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:43 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:43 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:43 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 343.069799][T11973] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 343.080891][T11973] FAT-fs (loop3): Filesystem has been set read-only [ 343.088410][T11973] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 343.441263][T11989] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 343.450173][T11989] FAT-fs (loop3): Filesystem has been set read-only [ 343.457404][T11989] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:45 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xc000000}, 0xfdef) 14:56:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r2, 0x0, 0x4ffe0, 0x0) 14:56:45 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:45 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:45 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:46 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:46 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xd000000}, 0xfdef) 14:56:46 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 345.826226][T12004] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 345.854197][T12004] FAT-fs (loop3): Filesystem has been set read-only 14:56:46 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) socket$inet6(0xa, 0x80003, 0xff) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 345.875058][T12004] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:46 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:46 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 346.289777][T12034] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 346.305687][T12034] FAT-fs (loop3): Filesystem has been set read-only [ 346.312496][T12034] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:48 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xe000000}, 0xfdef) 14:56:48 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:48 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:48 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:49 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x0, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:49 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0xf000000}, 0xfdef) 14:56:49 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, 0x0) read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:49 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x10000000}, 0xfdef) [ 348.978114][T12048] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 348.987212][T12048] FAT-fs (loop3): Filesystem has been set read-only [ 348.994332][T12048] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:49 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:49 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, 0x0) read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 349.560289][T12082] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 349.569475][T12082] FAT-fs (loop3): Filesystem has been set read-only [ 349.580279][T12082] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:52 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, 0x0) read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:52 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x40000000}, 0xfdef) 14:56:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:52 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(0x0, 0x0, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:52 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:52 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:52 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)) read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:52 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)) read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:52 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:52 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:56:52 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)) read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:55 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:55 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:55 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x2}, 0xfdef) 14:56:55 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 14:56:55 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:55 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x3}, 0xfdef) 14:56:55 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0b") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:55 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) [ 355.260770][T12151] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 355.289451][T12151] FAT-fs (loop3): Filesystem has been set read-only 14:56:55 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:55 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x4}, 0xfdef) [ 355.307156][T12151] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 355.316628][T12140] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 355.364610][T12140] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:56:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3", 0x6a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:58 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:56:58 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:58 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x5}, 0xfdef) 14:56:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 14:56:58 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:56:58 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:58 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:58 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x6}, 0xfdef) 14:56:58 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b20") read$alg(r0, &(0x7f0000000140)=""/39, 0x27) 14:56:58 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(0xffffffffffffffff, &(0x7f0000000140)=""/39, 0x27) 14:56:58 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(0xffffffffffffffff, &(0x7f0000000140)=""/39, 0x27) 14:57:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3", 0x6a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:01 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x7}, 0xfdef) 14:57:01 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(0xffffffffffffffff, &(0x7f0000000140)=""/39, 0x27) 14:57:01 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 14:57:01 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:01 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, 0x0, 0x0) 14:57:01 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, 0x0, 0x0) 14:57:01 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x8}, 0xfdef) 14:57:01 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") read$alg(r0, 0x0, 0x0) 14:57:01 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) 14:57:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0xffffffff}}, 0xe8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) socketpair(0xa, 0x80000, 0x26, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x1b, &(0x7f0000bfcffc), &(0x7f0000000000)=0x3) r4 = dup3(0xffffffffffffffff, r3, 0x80000) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r4, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2801b}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x130, r5, 0x800, 0x70bd26, 0x0, {}, [@TIPC_NLA_BEARER={0xe4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3a64}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x703}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x8, @loopback, 0x8001}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xa6, @local}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x58800}, 0x351be475e803cfd5) sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20104080}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x68, 0x0, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa0ed}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}]}]}, 0x68}}, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) r8 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x4d5, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5}}, 0xe8) sendmmsg(r8, &(0x7f0000000240), 0x400000000000052, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffb) 14:57:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3", 0x6a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:04 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x9}, 0xfdef) 14:57:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) getdents64(r1, 0x0, 0x0) 14:57:04 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) 14:57:04 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:04 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:04 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) getdents64(r1, 0x0, 0x0) 14:57:04 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:57:04 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0xa}, 0xfdef) 14:57:04 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:57:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) getdents64(r1, 0x0, 0x0) 14:57:07 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:57:07 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0xb}, 0xfdef) 14:57:07 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 14:57:07 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) getdents64(r1, 0x0, 0x0) 14:57:07 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0xc}, 0xfdef) 14:57:07 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) inotify_init() getdents64(r1, 0x0, 0x0) [ 367.766149][T12337] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 367.775015][T12337] FAT-fs (loop3): Filesystem has been set read-only [ 367.781714][T12337] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 367.790202][T12326] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 367.799106][T12326] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:57:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) inotify_init() getdents64(r1, 0x0, 0x0) 14:57:10 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:10 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0xd}, 0xfdef) 14:57:10 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 14:57:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) inotify_init() getdents64(r1, 0x0, 0x0) 14:57:10 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:10 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0xe}, 0xfdef) 14:57:10 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) [ 370.552547][T12392] ptrace attach of "/root/syz-executor.0"[12391] was attempted by "/root/syz-executor.0"[12392] [ 370.782726][T12402] ptrace attach of "/root/syz-executor.0"[12401] was attempted by "/root/syz-executor.0"[12402] 14:57:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:13 executing program 0: setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ab991eb60371e535", "c082df690d58cd99ad521c9a47d5da9e", "5968b292", "bf5c43445aca76c0"}, 0x28) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:13 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0xf}, 0xfdef) 14:57:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) 14:57:13 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r2, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 373.447439][T12423] ptrace attach of "/root/syz-executor.0"[12421] was attempted by "/root/syz-executor.0"[12423] 14:57:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:14 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x10}, 0xfdef) 14:57:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:14 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:14 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:57:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6e", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fchdir(0xffffffffffffffff) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(0xffffffffffffffff, 0x0, 0x0) 14:57:16 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x2}, 0xfdef) 14:57:16 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x0, 0x0) 14:57:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fchdir(0xffffffffffffffff) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(0xffffffffffffffff, 0x0, 0x0) 14:57:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fchdir(0xffffffffffffffff) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(0xffffffffffffffff, 0x0, 0x0) 14:57:17 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x3}, 0xfdef) 14:57:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6e", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:19 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x4}, 0xfdef) 14:57:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x0, 0x0) 14:57:19 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:20 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:20 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:20 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x5}, 0xfdef) [ 379.963460][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 379.969444][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 380.107263][T12517] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 380.120056][T12517] FAT-fs (loop3): Filesystem has been set read-only [ 380.127230][T12517] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 380.136626][T12529] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 380.146943][T12529] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:57:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6e", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:22 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:22 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x6}, 0xfdef) 14:57:22 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x20, 0x1a29, 0x0, 0x0, {0x7, 0x1000000}}, 0x14}, 0x1, 0xffffff7f0e000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x0, 0x0) 14:57:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) [ 382.683491][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 382.689570][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:57:23 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x7}, 0xfdef) 14:57:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:23 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:23 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x8}, 0xfdef) 14:57:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) [ 383.193596][T12568] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 383.203193][T12568] FAT-fs (loop3): Filesystem has been set read-only [ 383.210718][T12568] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 383.256271][T12562] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 383.274476][T12562] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:57:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be7", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:26 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x9}, 0xfdef) 14:57:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:26 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:26 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x0, 0x91fc, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0x0, 0x0, 0x80000001, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x1, 0x0, 0x4, 0x0, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x0, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x0, 0x2, 0x1}, r2, 0x0, r1, 0xa) gettid() perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000740)=0x643) openat$cgroup_ro(r3, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) 14:57:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:26 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0xa}, 0xfdef) 14:57:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0xe, 0x0, 0x0, 0x1f, 0x0, 0xffffffffffffffff, 0x6}, 0x3c) 14:57:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="2e0000002b000502d25a02008c7b94fb0a24fc0004000b400c000200053582c137153e37090001802f081700d1bd", 0x2e}], 0x1}, 0x0) 14:57:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be7", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:29 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0xb}, 0xfdef) 14:57:29 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8b2a55c49000daa1b548f0411f28fd83c017c8ee27229a65f147aa151b3e8de5cc532e8df0c3dd476ee94cd74b037"], 0x2f) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r7, r2, 0x0, 0xd, &(0x7f0000000200)='/dev/net/tun\x00'}, 0x30) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, 0x0, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 14:57:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r0, 0x0, 0x0) 14:57:29 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) [ 388.923467][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 388.929324][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:57:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:29 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0xc}, 0xfdef) 14:57:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) [ 389.465348][T12651] device nr0 entered promiscuous mode [ 389.539098][T12653] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 389.563493][T12653] FAT-fs (loop3): Filesystem has been set read-only [ 389.570318][T12653] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 389.578618][T12664] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 14:57:29 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 389.587517][T12664] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 390.061561][T12692] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 390.070759][T12692] FAT-fs (loop3): Filesystem has been set read-only [ 390.077677][T12692] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 390.086001][T12688] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 390.100932][T12688] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:57:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be7", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:32 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0xd}, 0xfdef) 14:57:32 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:32 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8b2a55c49000daa1b548f0411f28fd83c017c8ee27229a65f147aa151b3e8de5cc532e8df0c3dd476ee94cd74b037"], 0x2f) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r6 = socket$kcm(0x2, 0x1000000000000002, 0x0) r7 = gettid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r7, r2, 0x0, 0xd, &(0x7f0000000200)='/dev/net/tun\x00'}, 0x30) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, 0x0, 0x0) r8 = openat$cgroup_ro(r5, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) write$cgroup_type(r8, &(0x7f0000000080)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') 14:57:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(0xffffffffffffffff) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:32 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0xe}, 0xfdef) [ 392.377518][T12713] device nr0 entered promiscuous mode 14:57:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(0xffffffffffffffff) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:32 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0xf}, 0xfdef) 14:57:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(0xffffffffffffffff) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128", 0xce}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:35 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:35 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x10}, 0xfdef) 14:57:35 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x180000) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xff, 0x0, 0xab}) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x60000094) inotify_add_watch(r0, 0x0, 0x20000844) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x0) dup2(r0, r1) r2 = inotify_init() inotify_add_watch(r2, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x60000094) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20000844) inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) 14:57:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) inotify_init() inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='.\x00', 0x1) getdents64(r1, 0x0, 0x0) 14:57:35 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0x17) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 14:57:35 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:57:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, 0x0, 0x1) getdents64(r1, 0x0, 0x0) [ 395.267174][ T27] audit: type=1804 audit(1574693855.608:46): pid=12785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir096472910/syzkaller.XDNpb5/102/bus" dev="sda1" ino=17470 res=1 14:57:35 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x2}, 0xfdef) [ 395.989764][ T27] audit: type=1804 audit(1574693856.328:47): pid=12798 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir096472910/syzkaller.XDNpb5/102/bus" dev="sda1" ino=17470 res=1 [ 396.070616][ T27] audit: type=1804 audit(1574693856.408:48): pid=12797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir096472910/syzkaller.XDNpb5/102/bus" dev="sda1" ino=17470 res=1 [ 396.100452][ T27] audit: type=1800 audit(1574693856.408:49): pid=12797 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=17470 res=0 14:57:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128", 0xce}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, 0x0, 0x1) getdents64(r1, 0x0, 0x0) 14:57:38 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x3}, 0xfdef) 14:57:38 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:38 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0x17) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r3 = dup(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 14:57:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, 0x0, 0x1) getdents64(r1, 0x0, 0x0) 14:57:38 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x4}, 0xfdef) [ 398.229867][ T27] audit: type=1804 audit(1574693858.568:50): pid=12824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir096472910/syzkaller.XDNpb5/103/bus" dev="sda1" ino=17490 res=1 14:57:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x0) getdents64(r1, 0x0, 0x0) 14:57:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x0) getdents64(r1, 0x0, 0x0) 14:57:38 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x5}, 0xfdef) 14:57:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x0) getdents64(r1, 0x0, 0x0) 14:57:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128", 0xce}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(0xffffffffffffffff, 0x0, 0x0) 14:57:41 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x6}, 0xfdef) 14:57:41 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:41 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000a80)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x202002) keyctl$revoke(0x3, r1) 14:57:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(0xffffffffffffffff, 0x0, 0x0) 14:57:41 executing program 5: select(0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x2, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:41 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x7}, 0xfdef) 14:57:41 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1}, 0x14) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c4600000000ff32"], 0xa) 14:57:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') fchdir(r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0x1) getdents64(0xffffffffffffffff, 0x0, 0x0) 14:57:41 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x8}, 0xfdef) 14:57:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:44 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x88])+\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) ftruncate(r0, 0x4f17) sendfile(r0, r0, &(0x7f00000001c0), 0x1000000ff9) unlink(&(0x7f0000000400)='./file0\x00') 14:57:44 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x9}, 0xfdef) 14:57:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000000000)="1f0000001000ff00fd4354c007110000f305010005000100060423dcffdf00", 0x1f) 14:57:44 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:44 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) [ 404.283465][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 404.289316][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:57:44 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xa}, 0xfdef) 14:57:44 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:44 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) [ 404.845247][T12926] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 404.854226][T12926] FAT-fs (loop3): Filesystem has been set read-only [ 404.861157][T12926] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:57:45 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xb}, 0xfdef) 14:57:45 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r0, r0, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:47 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:47 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:57:47 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xc}, 0xfdef) 14:57:47 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r0, r0, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:47 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:47 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xd}, 0xfdef) 14:57:48 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:48 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xe}, 0xfdef) 14:57:48 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r0, r0, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:48 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:57:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:50 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:50 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xf}, 0xfdef) 14:57:50 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:57:50 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r0, r0, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:50 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:50 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:50 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:50 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x10}, 0xfdef) 14:57:51 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:51 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3be", 0xd3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:53 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x300}, 0xfdef) 14:57:53 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:53 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r0, r0, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:53 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:57:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:53 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000000)='security.selinux\x00', 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:54 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x408}, 0xfdef) 14:57:54 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:54 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:54 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x500}, 0xfdef) 14:57:54 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3be", 0xd3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:56 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r0, r0, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:57:56 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x600}, 0xfdef) 14:57:56 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:56 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x8, 0x0, 0x8000) 14:57:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:56 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x8, 0x0, 0x8000) 14:57:57 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x700}, 0xfdef) 14:57:57 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:57 executing program 5: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:57 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x8, 0x0, 0x8000) [ 416.843465][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 416.849454][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:57:57 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x804}, 0xfdef) 14:57:59 executing program 5: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:57:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3be", 0xd3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:57:59 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:57:59 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x900}, 0xfdef) 14:57:59 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3", 0x6a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:00 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:00 executing program 5: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:00 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:00 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:00 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xa00}, 0xfdef) 14:58:00 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:00 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) 14:58:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:02 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:02 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xb00}, 0xfdef) 14:58:02 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3", 0x6a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:03 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) 14:58:03 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:03 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xc00}, 0xfdef) 14:58:03 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:03 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:03 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xd00}, 0xfdef) 14:58:03 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:06 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:06 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 14:58:06 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xe00}, 0xfdef) 14:58:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3", 0x6a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:06 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) 14:58:06 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 14:58:06 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0xf00}, 0xfdef) 14:58:06 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 14:58:06 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:58:06 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x0, 0x0, 0x0, 0x4000}, 0xfdef) 14:58:06 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:58:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:09 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 14:58:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:09 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfe8) 14:58:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:09 executing program 2: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:09 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 14:58:09 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x1fe8) 14:58:09 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 14:58:09 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 14:58:09 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x2fe8) 14:58:09 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:09 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:12 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x3fe8) 14:58:12 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x34}}, 0x0) 14:58:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:12 executing program 2: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:12 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 14:58:12 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x4fe8) [ 432.359092][T13343] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 432.367816][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 432.368275][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 432.487878][T13343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 432.520814][T13343] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:58:12 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x5fe8) 14:58:12 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 432.694573][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 432.707247][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 432.716145][T13354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:58:13 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 14:58:13 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:13 executing program 2: r0 = creat(0x0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:13 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x6fe8) [ 433.124217][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 433.261916][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 433.323911][T13361] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 14:58:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:15 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x2c}}, 0x0) 14:58:15 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x7fe8) 14:58:15 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:15 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(0x0, 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:15 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x2c}}, 0x0) 14:58:15 executing program 5: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000040)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xc, 0x1, @dev}]}, 0x2c}}, 0x0) 14:58:15 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(0x0, 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:15 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x8fe8) 14:58:15 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(0x0, 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) epoll_create1(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x2594, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x11, 0xffffff84, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x10}, @multicast1}}}}}}, 0x0) pivot_root(0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x29b30e782a7f2b0b, 0x0) 14:58:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6e", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:18 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:18 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x9fe8) 14:58:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) epoll_create1(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x2594, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x11, 0xffffff84, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x10}, @multicast1}}}}}}, 0x0) pivot_root(0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x29b30e782a7f2b0b, 0x0) 14:58:18 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:18 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) epoll_create1(0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioperm(0x2594, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x11, 0xffffff84, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x10}, @multicast1}}}}}}, 0x0) pivot_root(0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x29b30e782a7f2b0b, 0x0) 14:58:18 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:18 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xafe8) 14:58:19 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a313e9a5da92834ab2a6e75cbf562da694e11ab1acfa6f7bd515a508f61f637721c985f477e90ca6d3c59a9bf9d7bc77d4c9bc678ca548a88c1e7d23d541c46f1f7f55e4aad90fc081e1a2ac9ba443449fd1b923756f0e350465a7cd193d547d6fa82893a0748aa1e0301dff78f7f900cd37cbe26f11c3aab7b123d2e2604ad771cc1fb7920f04be424f29accb1e578d74dc95b913dac35c6bd75c263d26e3f9b"], 0xa3) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0), 0x40000000000016b, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000000380)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @empty}}, 0x80) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x4000, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000300)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r2, &(0x7f0000000080), 0xff97) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0xff97) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000280)=0x296) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 14:58:19 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, 0x0, 0x0, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) [ 438.843450][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 438.849381][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:58:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6e", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:21 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0x11, 0x3, 0x0) setsockopt(r1, 0x2000000000000107, 0x1, &(0x7f00000000c0)="010000000000060000071a80000001cc", 0x10) close(r1) 14:58:21 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, 0x0, 0x0, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:21 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xbfe8) 14:58:21 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:21 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, 0x0, 0x0, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:21 executing program 5: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{}, 0x2}}, 0x10, 0x0}, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x0, 0x91fc, 0x5, 0x2, 0x0, 0x0, 0x0, 0x2, 0x101, 0xffffffff, 0x2, 0x6, 0x8bd6, 0xfd, 0xa5de, 0x0, 0x80000001, 0x100000001, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x5, 0x6, 0x1, 0x0, 0x4, 0x0, 0x7, 0x6, 0xba2, 0x1, 0x5, 0x7, 0x0, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000100), 0x8}, 0x1000, 0x7fffffff, 0x1, 0x5, 0x0, 0x2, 0x1}, r2, 0x0, r1, 0xa) r3 = gettid() perf_event_open(0x0, r3, 0x10, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000740)=0x643) openat$cgroup_ro(r4, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e180f000000e8bd6efb120009000e0001004000", 0x26}], 0x1}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000440)='!,eth0GPL.\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$SIOCSIFHWADDR(r6, 0x8924, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) 14:58:21 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0), 0x0, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:22 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xcfe8) 14:58:22 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0), 0x0, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:22 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xdfe8) 14:58:22 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0), 0x0, 0x83dc) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6e", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:24 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8b2a55c49000daa1b548f0411f28fd83c017c8ee27229a65f147aa151b3e8de5cc532e8df0c3dd4"], 0x28) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, 0x0) 14:58:24 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0x1, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:24 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xefe8) 14:58:24 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:24 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0x1, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:25 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0x2000feef) 14:58:25 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0x1, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) 14:58:25 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) [ 445.111230][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 445.117787][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 445.326823][T13538] device nr0 entered promiscuous mode 14:58:25 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:26 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) [ 446.481327][T13551] device nr0 entered promiscuous mode 14:58:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be7", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:27 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfffffdef) 14:58:27 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:27 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) 14:58:27 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8b2a55c49000daa1b548f0411f28fd83c017c8ee27229a65f147aa151b3e8de5cc532e8df0c3dd4"], 0x28) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x1a0ffffffff) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, 0x0) 14:58:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 447.653583][T13600] FAT-fs (loop3): bogus number of reserved sectors [ 447.674592][T13600] FAT-fs (loop3): Can't find a valid FAT filesystem [ 447.963834][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 447.970503][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 448.043458][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 448.049466][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:58:28 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 448.512353][T13599] device nr0 entered promiscuous mode 14:58:28 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfffffffffffffdef) 14:58:28 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x0, 0x0, 0x8000) [ 448.680766][T13619] FAT-fs (loop3): bogus number of reserved sectors [ 448.744982][T13619] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:29 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_FPEXC(0xc, 0x100000) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000140)) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in={{0xa, 0x0, @empty}}}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000240)={r5, 0x81}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r6 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r6, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) r7 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r7, 0x400c6615, &(0x7f00000001c0)) write$UHID_SET_REPORT_REPLY(r6, &(0x7f0000000100), 0xfdef) 14:58:29 executing program 5: sendmsg$sock(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000440)=@ax25={{0x3, @bcast}, [@default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)="c565d9567a4f6399b62d29ba05", 0xd}], 0x1}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 449.243471][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 449.249376][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:58:29 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) [ 449.310134][T13638] device nr0 entered promiscuous mode [ 450.123421][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 450.129269][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:58:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be7", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:30 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:30 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x0, 0x0, 0x8000) 14:58:30 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)='ramfs\x80', 0x1000, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:30 executing program 5: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = gettid() perf_event_open(0x0, r0, 0x10, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000740)) openat$cgroup_ro(r1, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e180f000000e8bd6efb120009000e00", 0x22}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='!,eth0GPL.\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x200) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) 14:58:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 450.805850][T13664] FAT-fs (loop3): bogus number of reserved sectors [ 450.914774][T13664] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:31 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x28, &(0x7f00000000c0)}, 0x10) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4b) write$P9_RCREATE(r5, &(0x7f0000000040)={0x18, 0x73, 0x0, {{}, 0x10001}}, 0xfffffddf) creat(&(0x7f0000000080)='./file0/bus\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000100), 0xfdef) 14:58:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:31 executing program 5: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = gettid() perf_event_open(0x0, r0, 0x10, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000740)) openat$cgroup_ro(r1, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e180f000000e8bd6efb120009000e00", 0x22}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='!,eth0GPL.\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x200) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) 14:58:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be7", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:34 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) r4 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f0000000100)={0x4, 0x0, [{0x40000001, 0x3ff, 0x1, 0x7, 0x1000, 0x0, 0x7}, {0x80000001, 0xe48, 0x1, 0x0, 0x0, 0xff, 0x7f}, {0xd, 0x7fff, 0x5, 0x7ff, 0x9, 0x4, 0x800}, {0xd, 0x7ff, 0x4, 0x80, 0x8, 0x3, 0x3f}]}) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0e0200000500000200000000183a28cbc7012892bce640b828adead73f6fcaf8c105a157"], 0xfdef) 14:58:34 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:34 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x0, 0x0, 0x8000) 14:58:34 executing program 5: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = gettid() perf_event_open(0x0, r0, 0x10, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000740)) openat$cgroup_ro(r1, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e180f000000e8bd6efb120009000e00", 0x22}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='!,eth0GPL.\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x200) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) 14:58:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 453.832882][T13712] FAT-fs (loop3): bogus number of reserved sectors [ 453.902682][T13712] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:34 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000080)={&(0x7f0000ffe000/0x2000)=nil, 0x3, 0x0, 0x0, &(0x7f0000fff000/0x1000)=nil, 0x3}) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:34 executing program 5: sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b40)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\xc7\xbal&\x1e\xab\ry\xab0\xe6\f<\xed_\xee\xe6\x1b\xc9\xb0\t\x81\xac\x03\xa8s+\x8di\xb7V\xde\x15\xd3,\xb4\xeb\xcfwz\x1b\xac\xf8\xff\xbd\xe4\xa2\x84\v\x17\xf4*\x14\x83\r\xe2>*\xd4{\xdcH\x1b_\xab&\x98\x1b\xd7\x9b\xe9\xd7A\xe2\xc4\xfc\x03\xc9^\xb8\xd4Z\xee\x98', 0x2761, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = gettid() perf_event_open(0x0, r0, 0x10, 0xffffffffffffffff, 0x1) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6611, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000740)) openat$cgroup_ro(r1, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e180f000000e8bd6efb120009000e00", 0x22}], 0x1}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='!,eth0GPL.\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0x200) ioctl$SIOCSIFHWADDR(r3, 0x8924, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) [ 454.203454][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 454.209341][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 454.283652][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 454.289540][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:58:34 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e00000020000903d22780648c6394fb0124fc0010000b400c0002000535827ba2e3ad0dfbe39f347e4e81c486c137153e370900017cf964301c6a7540937e95fb25311b4887b85d78992952da9611eb", 0x809d}], 0x1}, 0x0) write(r4, &(0x7f00000008c0)="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", 0x1000) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB], 0xfdef) 14:58:34 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:35 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x77, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1, 0x0, 0x1dc}, 0xc40d8ba31c1d0fd0) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000080), &(0x7f0000000140)=0xc) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="9088000000ee8dc00f06"], 0xfdef) [ 454.752827][T13749] FAT-fs (loop3): bogus number of reserved sectors [ 454.784891][T13749] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128", 0xce}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:37 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="140000002b000502d25a02008c7b94fb0324fc00", 0x14}], 0x1}, 0x0) 14:58:37 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x0) 14:58:37 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:37 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:37 executing program 5: [ 456.880577][T13767] FAT-fs (loop3): bogus number of reserved sectors [ 456.893542][T13767] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:37 executing program 5: [ 456.923432][ C0] protocol 88fb is buggy, dev hsr_slave_0 14:58:37 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f0000000180)='./file1\x00', 0xe6) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xfdef) r3 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$SG_GET_KEEP_ORPHAN(r4, 0x2288, &(0x7f0000000080)) 14:58:37 executing program 5: 14:58:37 executing program 5: 14:58:37 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000140)=0x4) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128", 0xce}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:40 executing program 5: 14:58:40 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:40 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x6, 0x8000) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000800)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4800044}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100025bd7000fedbdf25130000006c010100380004001400010002004e247f0000010000000000000000200002000a004e2200000003000000000000000000000000000000000100000038000400200001000a004e22fffffff7fe880000000000000000000000000101008000001400020002004e23000004010000000000000000100001006574683a69705f76746930001c00020008000300cc0000000800010017000000080004000500000044000400200001000a004e23000000fefe80000000000000000000000000001caf480000200002000a004e2100000fffff010000000000000000000000000001080000002c0002000800030081ffffff0800040007000000080004006405000008000400ee2d0000080001000c0000002400020008000200810000000800040006000000080001002000000008000400ff7f0000380004001400010002004e237f0000010000000000000000200002000a004e22000007d100000000000000000000000000000000030000002c000900080001007e1a00000800010029050000080001000000280008000200000001000800010002000000b400010034000200080004008100000008000400000000000800010011000000080001000f00000008000400018000000800020007000000100001007564703a73797a320000000054000200080001001b00000008000300090000000800040001800000080001000a000000080002008000000008000300010000000800040007000000080004000400000008000400030000000800030001000000180001006574683a7465616d5f736c6176655f3000000000f00001002c0004001400010002004e23ac1414bb00000000000000001400020002004e21ac14141600000000000000002c0004001400010002004e21ac14140c00000000000000001400020002004e20ac1414bb0000000000000000180001006574683a7465616d5f736c6176655f31000000001800010069623a76657468315f746f5f7465616d00000000080003008dfd00001c0002000800030020000000080003003f00000008000200aad50000100001007564703a73797a310000000014000200080004000200000008000400010000000c0002000800010016000000100001007564703a73797a3200000000100005000c000200080003007f00000028000400240007000800030040000000080002000080ffff0800040002000000080001001d0000002400050008000100756470000c0002000800030081ffffff0c00020008000400070000007000050008000100696200000c000200080002000100008008000100657468001400020008000400f906000008000400ff0100000c000200080002000700000008000100756470001c00020008000300000000000800040001000000080001001f0000000c00020008000200ff7f0000"], 0x41c}, 0x1, 0x0, 0x0, 0x4004}, 0x4008090) ioctl$USBDEVFS_DISCONNECT_CLAIM(r4, 0x8108551b, &(0x7f0000000240)={0x8, 0x0, "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"}) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:40 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x0) 14:58:40 executing program 5: [ 459.928591][T13814] FAT-fs (loop3): bogus number of reserved sectors [ 459.967985][T13814] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:40 executing program 5: 14:58:40 executing program 4: r0 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) r2 = creat(&(0x7f0000000480)='./file0/bus\x00', 0x8) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f00000004c0)=0x83d9, &(0x7f00000005c0)=0x4) r3 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000140)={0x81, 0x401, 0xfff}, 0xc) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000180)={r1, 0x7}, &(0x7f0000000340)=0x8) getpeername$ax25(r3, &(0x7f0000000240)={{0x3, @bcast}, [@remote, @rose, @remote, @null, @remote, @rose, @null, @default]}, &(0x7f0000000080)=0xffffffffffffff5a) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r8, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r9 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r8, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r9, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$RNDZAPENTCNT(r9, 0x5204, &(0x7f00000001c0)=0xce8) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r10 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r10, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r10, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000000000000d22f02"], 0xfdef) 14:58:40 executing program 5: creat(0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x4b72, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x120000003}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)={0x2001}) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000080)={0x3f, 0x3f, 0x40, 0xffff}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="f84633ba6eb6", 0x6, 0xfffffffffffffffb) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) r5 = creat(0x0, 0x0) fallocate(r5, 0x10, 0x0, 0x8800000) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:gpg_agent_exec_t:s0\x00', 0x26, 0x2) fdatasync(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 14:58:40 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x0, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:41 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r4, 0x0, 0x0) r5 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) write$P9_RCREATE(r5, &(0x7f0000000080)={0x18, 0x73, 0x2, {{0x0, 0xffffffff, 0x2}, 0x5}}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128", 0xce}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:43 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:43 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000003c0)='6', 0xfffffee5, 0x83dc) fallocate(r0, 0x8, 0x0, 0x0) 14:58:43 executing program 5: creat(0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x4b72, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = epoll_create1(0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = dup3(r2, r1, 0x0) r4 = epoll_create1(0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f00000000c0)={0x120000003}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000000)={0x2001}) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000080)={0x3f, 0x3f, 0x40, 0xffff}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="f84633ba6eb6", 0x6, 0xfffffffffffffffb) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000002c0)) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r6, 0x10, 0x0, 0x8800000) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:gpg_agent_exec_t:s0\x00', 0x26, 0x2) fdatasync(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000005c0)={@loopback, @rand_addr="fd0c11b254f643757b4554bf46c94d6b", @rand_addr="b1a0802fac0118e1d9d6ddb5f31b8a88", 0x0, 0x3ff, 0x7, 0x0, 0x1f, 0x2810200}) socket$inet6_tcp(0xa, 0x1, 0x0) 14:58:43 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000480)={'#! ', './file0/bus', [{0x20, 'ramfs\x00'}, {}, {0x20, '#! '}, {0x20, '&'}, {0x20, '## \xe2&\xa6\xbch\x84\x00\x00f\xec\x8f\xec\b\x8cIC\x94F\xcb\xb1\x81\xe3\xf5\xf1\xda\x8c\x18\x16\xa8\xc2\x9a\xee\xe8\x98\xbc+\xd4\x86\x00\x00\x00\x00\x00\x00\x00\x00'}, {0x20, '\xeb\x8d\xd1.|\xf9\xce\x1bJ/u\x86\xee\xf6'}, {0x20, '#! '}], 0xa, "7eb5432305ecfb271266df120cab8b7bf138fa0b35359c85d730bf28e7bd84e17b1a21f9020f100719eca25aa714338600"/59}, 0x40) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000240)={{0x5, 0x404, 0x7, 0x1000}, 'syz1\x00', 0x3}) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) [ 463.022622][T13858] FAT-fs (loop3): bogus number of reserved sectors 14:58:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:43 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r3, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000080)={0x31, 0x3, 0x0, {0x6, 0x10, 0x0, '%*locpusetvmnet1'}}, 0x31) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100), 0xfdef) [ 463.162514][T13858] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:43 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) r5 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$sock_rose_SIOCDELRT(r5, 0x890c, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x101, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0e00e8000000000000000000"], 0xfdef) 14:58:44 executing program 5: creat(0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x4b72, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = epoll_create1(0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r3 = dup3(r2, r1, 0x0) r4 = epoll_create1(0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f00000000c0)={0x120000003}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000000)={0x2001}) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000080)={0x3f, 0x3f, 0x40, 0xffff}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="f84633ba6eb6", 0x6, 0xfffffffffffffffb) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000002c0)) r6 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r6, 0x10, 0x0, 0x8800000) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:gpg_agent_exec_t:s0\x00', 0x26, 0x2) fdatasync(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000005c0)={@loopback, @rand_addr="fd0c11b254f643757b4554bf46c94d6b", @rand_addr="b1a0802fac0118e1d9d6ddb5f31b8a88", 0x0, 0x3ff, 0x7, 0x0, 0x1f, 0x2810200}) socket$inet6_tcp(0xa, 0x1, 0x0) 14:58:44 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 463.877520][T13889] FAT-fs (loop3): bogus number of reserved sectors [ 463.889055][T13889] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:44 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) lsetxattr$security_selinux(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:dmidecode_exec_t:s0\x00', 0x26, 0x2) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:44 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) close(r0) 14:58:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) 14:58:46 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x111}}, 0x20) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x3dd8ff648cf0e457, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r5, r6}}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x9, 0x4, 0x0, 0xffffffffffffff7e}, 0xc) 14:58:46 executing program 2: creat(0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x4b72, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0x3f, 0x3f, 0x40}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="f84633ba6eb6", 0x6, 0xfffffffffffffffb) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x65db}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000002c0)) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x10, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:gpg_agent_exec_t:s0\x00', 0x26, 0x2) fdatasync(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000005c0)={@loopback, @rand_addr="fd0c11b254f643757b4554bf46c94d6b", @rand_addr="b1a0802fac0118e1d9d6ddb5f31b8a88", 0x0, 0x3ff, 0x7, 0x0, 0x1f}) socket$inet6_tcp(0xa, 0x1, 0x0) 14:58:46 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 466.201572][T13915] FAT-fs (loop3): bogus number of reserved sectors [ 466.210296][T13915] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:46 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(0xffffffffffffffff, r0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000140)={0xe, 0x0, 0x6, 0x80, 0x3c, "d281000d2037776649a39983d6c5d39562bd65cf24b78a640200006e2c60bc01c3b88b5c8a1eb27987a920b681049b9da1b94efad7695070ff546a89"}, 0x48) 14:58:46 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) 14:58:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:46 executing program 2: 14:58:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) 14:58:47 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setitimer(0x0, &(0x7f00000003c0)={{0x0, 0x2710}, {0x77359400}}, &(0x7f0000000400)) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) r3 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) r4 = shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmdt(r4) shmdt(r4) shmdt(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f00000001c0)=0x80) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f00000000c0)={r8, @in={{0xa, 0x0, @empty}}}, &(0x7f0000000040)=0x90) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f00000002c0)={r8, 0x47, "1f5ecd37924dcd1ab6d17abceb52fcd56dd8042846ee30ae11184f67b3b413ad26558226134a093536f9e498010e611c2f3fc2c85a4f2a5cac3137e669c3d03fcb45771db137ed"}, &(0x7f0000000340)=0x4f) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r9 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r9, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r9, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000200000000000000"], 0xfdef) 14:58:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:49 executing program 2: 14:58:49 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) 14:58:49 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) r4 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4000, 0x0) renameat(r4, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000000080)) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) r6 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r6, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r6, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r7, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$VIDIOC_QUERYMENU(r7, 0xc02c5625, &(0x7f0000000140)={0x2, 0x3, @value=0x1000}) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:49 executing program 2: [ 469.206370][T13969] FAT-fs (loop3): bogus number of reserved sectors [ 469.219303][T13969] FAT-fs (loop3): Can't find a valid FAT filesystem [ 469.255936][ T27] audit: type=1804 audit(1574693929.598:51): pid=13968 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir077603516/syzkaller.d5ARKJ/272/file0/bus" dev="ramfs" ino=47187 res=1 14:58:49 executing program 2: [ 469.315376][ T27] audit: type=1804 audit(1574693929.628:52): pid=13975 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir077603516/syzkaller.d5ARKJ/272/file0/bus" dev="ramfs" ino=47187 res=1 14:58:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:58:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:50 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000180)={{&(0x7f0000bfd000/0x400000)=nil, 0x400000}, 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RXATTRWALK(r0, &(0x7f00000001c0)={0xf, 0x1f, 0x2, 0x4}, 0xf) r2 = socket$packet(0x11, 0x2, 0x300) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x199) setuid(r5) stat(&(0x7f0000000280)='./file0/bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, r5, r6) r7 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x2040012, 0x0) r8 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r8, &(0x7f0000000040)={0xfffffffffffffff1}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000240)={0x81, 0x29, 0xff, 0x2, 0x9, 0x80, 0x9, 0x40, 0x7f, 0x3f, 0x20}, 0xb) write$UHID_SET_REPORT_REPLY(r8, &(0x7f0000000100)=ANY=[@ANYBLOB="26fecae7a1f646ee609403cb3772460622bca68d2a8c73d3e5601ef18e66eabfeead4f06b7b0e43060a4ab8305c5a2345066a15f40dac394a13c61912f56701f6921bf0466b8ab2632c93ee6c65c82b208af0b554ae489ae8af83ed5689cf351446e5ff4"], 0xfdef) r9 = epoll_create(0xb86) write(r9, &(0x7f0000001700)="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", 0x1000) 14:58:50 executing program 2: 14:58:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 469.813498][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 469.819340][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:58:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) sendfile(r0, r0, 0x0, 0x24000000) 14:58:52 executing program 2: 14:58:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:52 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="856556f6037cf5773c0e0008000096973409e100000000000000bbb3f6229a3021f32d6353402f48f3b436b77888ab948e9eeb0578d4d0da65d35ba58a05ce0b1bcac1aa699a5427ab59879af5"], 0xfdef) 14:58:52 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:52 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x1) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) [ 472.296866][T14015] FAT-fs (loop3): bogus number of reserved sectors [ 472.315889][T14015] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) sendfile(r0, r0, 0x0, 0x24000000) 14:58:52 executing program 4: mkdir(&(0x7f0000000300)='./file0/bus\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) recvmsg$kcm(r2, &(0x7f00000002c0)={&(0x7f0000000140)=@rc, 0x80, &(0x7f0000000080)=[{&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/116, 0x74}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x3, &(0x7f00000001c0)=""/49, 0x31}, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:52 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) sendfile(r0, r0, 0x0, 0x24000000) 14:58:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001840)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x8001, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000000e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000ac0)={0xa, 0x0, 0x0, @ipv4}, 0x1c, 0x0}}], 0x2, 0x0) 14:58:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:58:53 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) [ 472.737113][T14047] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 14:58:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a313e9a5da92834ab2a6e75cbf562da694e11ab1acfa6f7bd515a508f61f637721c985f477e90ca6d3c59a9bf9d7bc77d4c9bc678ca548a88c1e7d23d541c46f1f7f55e4aad90fc081e1a2ac9ba443449fd1b923756f0e350465a7cd193d547d6fa82893a0748aa1e0301dff78f7f900cd37cbe26f11c3aab7b123d2e2604ad771cc1fb7920f04be424f29accb1e578d74dc95b913dac35c6bd75c263d26e"], 0xa1) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0), 0x40000000000016b, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000280)=0x296) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000040)) 14:58:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3be", 0xd3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:58:55 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000240)={{0x2, 0x2, 0x80000, 0x55, 'syz1\x00', 0x7fff}, 0x1, 0x1, 0x1, r3, 0x1, 0xae, 'syz0\x00', &(0x7f0000000080)=['cpuset\x00'], 0x7, [], [0x80, 0x1, 0x7f, 0x400]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r5, 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r5, &(0x7f00000004c0)={0xe, 0x0, 0x0, 0x0, 0xffffffffffffff56, "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"}, 0x216) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r6, 0x5428) 14:58:55 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a313e9a5da92834ab2a6e75cbf562da694e11ab1acfa6f7bd515a508f61f637721c985f477e90ca6d3c59a9bf9d7bc77d4c9bc678ca548a88c1e7d23d541c46f1f7f55e4aad90fc081e1a2ac9ba443449fd1b923756f0e350465a7cd193d547d6fa82893a0748aa1e0301dff78f7f900cd37cbe26f11c3aab7b123d2e2604ad771cc1fb7920f04be424f29accb1e578d74dc95b913dac35c6bd75c263d26e"], 0xa1) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0), 0x40000000000016b, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000280)=0x296) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000040)) 14:58:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:55 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 475.459342][T14082] FAT-fs (loop3): bogus number of reserved sectors [ 475.482376][T14082] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:56 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) syz_open_dev$sndseq(&(0x7f0000000440)='/dev/snd/seq\x00', 0x0, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) sendmsg$kcm(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) preadv(r5, &(0x7f0000000080), 0x0, 0x7) r6 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r6, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) r7 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x2) r8 = open(0x0, 0x111400, 0x7) r9 = syz_open_dev$vivid(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_S_AUDIO(r9, 0x40345622, &(0x7f0000000240)={0x8, "aca593003fcfb13efef7482b5572c44c4a6ab762b3a511c84ab83bd26355e617"}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r8, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) mq_open(&(0x7f00000003c0)='-*vmnet0\x00', 0x80, 0x1ab, &(0x7f0000000400)={0x1f, 0x5, 0x3, 0x0, 0x5c69, 0x8000, 0x8000}) ioctl$TUNGETFEATURES(r8, 0x800454cf, &(0x7f0000000340)) write$UHID_SET_REPORT_REPLY(r6, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000000000000f70000"], 0xfdef) 14:58:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a313e9a5da92834ab2a6e75cbf562da694e11ab1acfa6f7bd515a508f61f637721c985f477e90ca6d3c59a9bf9d7bc77d4c9bc678ca548a88c1e7d23d541c46f1f7f55e4aad90fc081e1a2ac9ba443449fd1b923756f0e350465a7cd193d547d6fa82893a0748aa1e0301dff78f7f900cd37cbe26f11c3aab7b123d2e2604ad771cc1fb7920f04be424f29accb1e578d74dc95b913dac35c6bd75c263d26e"], 0xa1) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0), 0x40000000000016b, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000280)=0x296) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000040)) 14:58:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:58:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="73797a313e9a5da92834ab2a6e75cbf562da694e11ab1acfa6f7bd515a508f61f637721c985f477e90ca6d3c59a9bf9d7bc77d4c9bc678ca548a88c1e7d23d541c46f1f7f55e4aad90fc081e1a2ac9ba443449fd1b923756f0e350465a7cd193d547d6fa82893a0748aa1e0301dff78f7f900cd37cbe26f11c3aab7b123d2e2604ad771cc1fb7920f04be424f29accb1e578d74dc95b913dac35c6bd75c263d26e"], 0xa1) poll(0x0, 0x0, 0xffffffff) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001bc0), 0x40000000000016b, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) getdents(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') read$eventfd(r0, &(0x7f0000000080), 0xff97) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000280)=0x296) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f0000000040)) 14:58:56 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:58:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3be", 0xd3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:58:58 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) creat(&(0x7f0000000080)='./file0/bus\x00', 0xa0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:58:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz1\x00') write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 14:58:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:58:58 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:58:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 478.468329][T14128] input: syz1 as /devices/virtual/input/input7 [ 478.499870][T14127] FAT-fs (loop3): bogus number of reserved sectors [ 478.512618][T14127] FAT-fs (loop3): Can't find a valid FAT filesystem 14:58:58 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x1, 0x0, 0x0, 0x0, 0xfffffffe}}) 14:58:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:58:59 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x1, 0x0, 0x0, 0x0, 0xfffffffe}}) 14:58:59 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000100), 0xfdef) 14:58:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:58:59 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0x17) sendfile(r0, r0, &(0x7f00000001c0), 0x0) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r2 = dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 479.135480][ T27] audit: type=1804 audit(1574693939.478:53): pid=14165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir355857638/syzkaller.NIztq6/301/bus" dev="sda1" ino=17731 res=1 14:59:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3be", 0xd3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:01 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5405, 0x71dffc) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0xee13, 0x9}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100), 0xfdef) 14:59:01 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x88) r1 = socket$inet6(0xa, 0x3, 0x4) connect$inet6(r1, &(0x7f0000000500)={0xa, 0x0, 0x40f6, @dev={0xfe, 0x80, [], 0xb}, 0x1}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r1, r2, &(0x7f0000000240)=0x200, 0x4000000000dc) 14:59:01 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 481.678454][T14184] FAT-fs (loop3): bogus number of reserved sectors [ 481.688666][ C1] sd 0:0:1:0: [sg0] tag#4791 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 481.699133][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB: Test Unit Ready [ 481.705656][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.715299][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14:59:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 481.724964][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.734590][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.744406][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.754149][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.763802][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14:59:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 481.773415][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.782998][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.792627][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.802254][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.811891][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.821714][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.831365][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 481.840991][ C1] sd 0:0:1:0: [sg0] tag#4791 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 14:59:02 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 481.931436][T14184] FAT-fs (loop3): Can't find a valid FAT filesystem [ 482.002455][ C1] sd 0:0:1:0: [sg0] tag#4797 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 482.012981][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB: Test Unit Ready [ 482.019506][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.029157][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.039356][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14:59:02 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0x21000000802}) [ 482.050055][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.059692][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.069336][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.078971][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.088602][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.098300][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.107900][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.117513][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.127124][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.136880][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[c0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 14:59:02 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 482.147081][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[d0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 482.156712][ C1] sd 0:0:1:0: [sg0] tag#4797 CDB[e0]: 00 00 00 00 00 00 00 00 00 00 00 00 14:59:02 executing program 5: r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) [ 482.369427][T14215] FAT-fs (loop3): bogus number of reserved sectors [ 482.386770][T14215] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:04 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) setxattr$smack_xattr_label(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f0000000180)={'userselinux'}, 0xc, 0x1) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind(r4, &(0x7f0000000240)=@llc={0x1a, 0x323, 0x0, 0xd4, 0x24, 0x5, @dev={[], 0x27}}, 0x80) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) r5 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="0e000000215ec7ebca7561a2c2a7d5f0abdf4b401b312558"], 0xfdef) r6 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r6, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r6, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r7, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$SNDRV_TIMER_IOCTL_PVERSION(r7, 0x80045400, &(0x7f00000001c0)) write$uinput_user_dev(r5, &(0x7f00000003c0)={'syz0\x00', {0x9, 0x9ad, 0x3, 0xc9}, 0x34, [0x0, 0x7254, 0x0, 0x3, 0x1ff, 0xffffffff, 0x92c5, 0x9, 0x1ff, 0x2, 0x6, 0x2, 0xe9de, 0x120, 0xfffffffe, 0x6, 0x59, 0xa7, 0x8001, 0x101, 0x1, 0x3f, 0x0, 0xeb3, 0xdcd8, 0x7fffffff, 0x4, 0x41e, 0x9, 0x8, 0x40, 0x5, 0x9, 0xff, 0x4, 0x2, 0x1, 0x2, 0x2, 0x101, 0x7, 0x10001, 0x3ff, 0x315, 0x5, 0x8000, 0x5, 0x0, 0x5, 0x7fffffff, 0x1, 0x2, 0x6, 0x2, 0x20, 0xaf4, 0x10001, 0x0, 0x0, 0x5, 0x7, 0x89, 0x4, 0x3f], [0x3, 0x10000, 0x6, 0xffff, 0x2, 0x8, 0x3f, 0xd90a, 0x4, 0x1, 0x677, 0x8, 0x3f, 0x2, 0x9, 0x10001, 0x2, 0x1, 0x4, 0x5, 0x2, 0x6, 0x8, 0x1, 0xff, 0xff, 0x3c4, 0x0, 0x9, 0x10000, 0x1, 0x7, 0x7, 0x9, 0x3ff, 0xba, 0x8, 0x8, 0x4df4, 0x2, 0xffff914a, 0x10001, 0x1ff, 0x7, 0x4, 0x200, 0x6, 0x4, 0xffff, 0x3, 0x4ab, 0x2, 0x4, 0x5, 0x4, 0x6, 0x3f, 0x9, 0x4, 0x5, 0xfff, 0x100, 0x28000, 0x7], [0x2, 0x0, 0x7fff, 0x3, 0xa8a, 0xfffffc00, 0xffffff81, 0x7b, 0x1, 0x6b3a, 0x8001, 0x80000000, 0x4, 0x183, 0x1541913, 0x6, 0x9b, 0x1ff, 0x9, 0x9, 0x0, 0x9, 0x6, 0x7f, 0x7437, 0x8, 0x487504f8, 0x6, 0x0, 0x8, 0x34, 0x5, 0x5, 0x2fa, 0x290f, 0x3, 0xfff, 0x40, 0x8, 0x3, 0x7, 0x3, 0x1, 0x8, 0x2, 0xc0000000, 0x2, 0x78000000, 0x24000, 0x8, 0x85f, 0x8000, 0x1, 0x3f5, 0x1, 0x9, 0x9544, 0x7, 0x200, 0xfffffffd, 0x7ff, 0x1, 0x30, 0xffffffff], [0x4, 0x3, 0xffffffff, 0x4, 0x3ff, 0x8, 0xfffff001, 0x5, 0x5, 0x3, 0x8, 0x7, 0x1f, 0x8, 0x2, 0xffffffd1, 0x9, 0x1, 0x9, 0x9, 0x1ca96e0f, 0x587c, 0x80000000, 0xfff, 0xb0fd, 0x1, 0x7, 0x1ff, 0xff, 0x1, 0x4, 0x4, 0x80000001, 0xfffffff7, 0x8, 0x10001, 0x1, 0x2, 0x3ff, 0xfffffffa, 0x5, 0x5, 0x7, 0x1, 0x2, 0x8, 0x6, 0x2, 0x0, 0x0, 0x4, 0x80, 0x7f, 0x101, 0x1, 0x8, 0x2, 0x7fff, 0x8, 0x5f4, 0x0, 0xfffffff9, 0x3, 0x6]}, 0x45c) 14:59:04 executing program 5: r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) 14:59:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x70, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 14:59:04 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x3600000000000000, 0x25, 0x3af, &(0x7f0000000280)="4d50b441e692763113ef874588a8a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522d545fe2687c2c84e7e277dbeec093d28e628e0deeb87dfb97e2cf537f8a290ef8dfd470f07d7f7e18902313db58fceda21", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000100)}, 0x28) 14:59:05 executing program 5: r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24000000) [ 484.762034][T14239] FAT-fs (loop3): bogus number of reserved sectors [ 484.785961][T14239] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:05 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000100)) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="0e0000000000000000c432c64b54cb8bf092803e42b97f7e48b33a9c05b022d283c44d938d3645af4df2dfc80afce5721da25f143f5600"/70], 0xfdef) 14:59:05 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:05 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:05 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:08 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x4, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) io_setup(0x1, &(0x7f00000001c0)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) syz_open_procfs(r6, &(0x7f00000004c0)='attr/keycreate\x00') r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) io_submit(r5, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r7, 0x0}]) r8 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r8, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) r9 = openat$cgroup_subtree(r8, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) r10 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r10, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r10, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r10, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) io_submit(r5, 0x3, &(0x7f0000000400)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x5, r9, &(0x7f0000000180)="30d6d790e4d26b9448c8203d76c1244b6f0ba13040caadcf6a0fa8d73098625980dc449fae5ec63a968aebd3af38bcb4cbac950599e329373d24ba126d2f5b4feb5ae551750ebc05a659ccfe8b75f6911e", 0x51, 0x8, 0x0, 0x0, r10}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x6, r3, &(0x7f0000000280)="6d8882e30e2fc9a06e01b8b445fd14c11d9e744e8fb5ba4b53b33bc702330ec77bb4966313f98f16169c9a26cb10f7f3fcbcd1920d626ca41be483fff0ca55de34e3e2a124beff783bec6a770ab179a2136816881c36d22d2fa9afeef20d8bfdd30a16a9886d", 0x66, 0xfffffffffffffb87}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xa, 0x7, 0xffffffffffffffff, &(0x7f0000000340)="aea1cb759ec1d5bcf2cae746a392cca2400e90b11b8dfa01ebc44e2b95f79e77c80d8f04", 0x24, 0xfffffffffffffffa, 0x0, 0x2}]) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100), 0xfdef) 14:59:08 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:08 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:08 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 487.860097][T14298] FAT-fs (loop3): bogus number of reserved sectors [ 487.893565][T14298] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:08 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) r4 = open$dir(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x18000, 0x0) mkdirat(r4, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r6, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f00000001c0)=[@window={0x3, 0x9, 0x4}, @sack_perm, @timestamp], 0x3) renameat(r4, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$P9_RCREATE(r7, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x6c857abbf9ff8b2e}, 0xffffffff}}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x1ff, 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="00a6c971e94f69eb26d7ac587a4b1228aca9917a2f1542a4618df5632de030db2f4dc5fae0e248af3454c76540efa22902ea92f54f800fce6d7cc772cd486e527b2da9215c1bdb526403de8cffb055b400423a4077761aef80f30000000000000000"], 0xfdef) fstatfs(r0, &(0x7f00000003c0)=""/126) 14:59:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:08 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) tee(r4, r5, 0x9, 0x2) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:59:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:11 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:11 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000008c0)={"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"}) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f00000003c0)) r4 = socket$kcm(0x10, 0x2, 0x0) ustat(0x7, &(0x7f0000000180)) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @rand_addr=0xac51}}) 14:59:11 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(0x0, 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 490.917849][T14354] FAT-fs (loop3): invalid media value (0x00) [ 490.959675][T14354] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:11 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x2, 0x300) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r5, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000100), 0xfdef) 14:59:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, 0x0, 0x0, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:11 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x199) setuid(r2) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt(r3, 0x0, 0x40, &(0x7f0000000000), 0x18) fstat(r3, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [], {0x4, 0x2}, [{0x8, 0x0, r4}], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000018c0)={{{@in6=@ipv4={[], [], @multicast2}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000007c0)=0xe8) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000140)='./file0/bus\x00', 0x2, 0xa, &(0x7f00000006c0)=[{&(0x7f0000000180)="fd6db8c1bc5ac86d887e56e19d825edd5c9781810caaf2c2acaf0ab570eeee", 0x1f, 0x3fff80000000000}, {&(0x7f0000000240)="91d32bdefb219ea14bad807dfb64416ac0c599d1d35efba0c5a812bf09166a12ab6c4fdba455f15eae0bd0fc1f5cd96873cc34b76992e5937b2409086fe9d71c529384cc55e859c27e6056ab63273743c0ccaf343d7faeb3dc9ce2280b8c146fefe025d9b0e9d550d5463566a55bcc3b0838d70e32301cf3048ec026e55eebb693421bc56fbc4bab9feb2a81eb907238ece801ff2fa86ac7a5e16fb0d4d38e6257688647960d8cdac5c50a97b64f0112a99a4ae36c427e856cf16d068b0941997b94c7", 0xc3, 0x80000001}, {&(0x7f00000001c0)="ca1934f1fa8a86efe68f1a622e9660518a056958ab180160a1cc045c9f524f545d49eec7f4e715be8ac54457058af9", 0x2f, 0x1}, {&(0x7f00000003c0)="2c7edbdefb2d51ec9e51f5a8aa2689b65db02cc98f8668d0911c44a2d706e67266dc5efd8936cc5304892537e60f181c6c3dd7e95484577d70da49244546b8081ff53e82b01189a73e5e66ec2266516e", 0x50, 0x1}, {&(0x7f00000008c0)="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", 0x1000}, {&(0x7f0000000440)="f7c7dcbecb7a5765eed144931d5f765b4934f87ca82f5cb441e033041800362581abbcdfa3604bf0b19e9ca98b0a1f99a0566aa4a216d2d2eee7d66bce754f2c77c4552ac67bd9489ba0f77aae6e084eafef4e2a0d08f7dc189db9bad03632e598c63a6bccd7d0320f0ad2e21562e8b26882e977d4bbca18a120e2bdc954f3083caad9dc3a2a91ef7a5db6a24945cfea09f42c5e7edc849754d8bffc72dadeb42f905d626523364cf4b9b65faa400b16464d319ef8e8c1a9ebd4", 0xba, 0x200}, {&(0x7f0000000500)="0cfe742db09728c372de4965ffb653528fa4af153fbc1a59a4494ac1202672cc9756097383b5f23278c548a3a54784bab566c7e8ca97eecca9df226bcbc01c15025b3614dbcc7bb9de", 0x49, 0x6e}, {&(0x7f0000000340)="e9f2ff4c54ec", 0x6, 0x5}, {&(0x7f0000000580)="f00a32ebd07340ac6261dbc9df850f780b65a0bdfa9247a29c1b89930b52dbaed6d0665d5aae16fc11edcdbb663d23f010b42f683ac428352bb4b5052d8a32cb66d58fde2181e017162d5a0e4bafe0810cb32fbf5abefe62d14b3766847694a3d98dc0d1", 0x64, 0x8000}, {&(0x7f0000000600)="3620e48a0dbe7069e812363113fce169db4da89373a228aa6c8153ef4953a2e6d8c275fa689d4092a21715b2ed3e31e75b5608dc80d0a4fc17fffaf23a1b3870d4ebb39a9423247c4d763cb024c7b5c97687c93c760d35e6f74e1a92d9e9110d6eb590a06cb30bec58576a0d401a7d9be00c6d0bec7be98ece054820d6280d98a756b816156d060bb5ae518e8f252052fe2eab068236cda6cb20aa2666eb", 0x9e, 0x8}], 0x0, &(0x7f00000019c0)={[{@nojoliet='nojoliet'}, {@norock='norock'}, {@dmode={'dmode', 0x3d, 0x3}}, {@block={'block', 0x3d, 0x400}}, {@uid={'uid', 0x3d, r2}}, {@gid={'gid', 0x3d, r4}}, {@sbsector={'sbsector', 0x3d, 0x7}}, {@map_off='map=off'}, {@nocompress='nocompress'}], [{@appraise_type='appraise_type=imasig'}, {@measure='measure'}, {@appraise_type='appraise_type=imasig'}, {@pcr={'pcr', 0x3d, 0x24}}, {@uid_lt={'uid<', r5}}]}) r6 = socket$packet(0x11, 0x2, 0x300) r7 = fcntl$dupfd(r0, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r8 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r8, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r8, &(0x7f0000000100), 0xfdef) 14:59:12 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 491.970335][T14410] FAT-fs (loop3): invalid media value (0x00) [ 491.989152][T14410] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:14 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000240)=ANY=[@ANYBLOB="0e000000000000000000000039d8ee05b2750dd3d10da98f61b554f784833b1566548c30090ef0a8b8e875b655f0a18708101851eb9cd4e19a9bcc5857ea6805b98c2ffff0d858409e8e82f308a7490b7bbacbc8ddfb27f24f5d9c9b8c6f482368c88e7d120bad550215e52005dd52c4ee678df31825fe2f7d30c7dc56f2489c111309229bafe4208600d904236cf75e3cee0d52143ce913ee9c43"], 0xfdef) 14:59:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, 0x0, 0x0, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:14 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:14 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, 0x0, 0x0, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 494.068416][T14429] FAT-fs (loop3): invalid media value (0x00) 14:59:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:14 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r2, 0x5422) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) [ 494.125139][T14429] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:14 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340), 0x0, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:15 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:17 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) link(&(0x7f0000000180)='./file0/bus\x00', &(0x7f00000001c0)='./file0/file0\x00') r2 = fcntl$dupfd(r0, 0x0, r1) r3 = getpid() sched_setattr(r3, &(0x7f00000007c0)={0x298, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000300)='net/hci\x00') r5 = socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, r6, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\b'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f00000005c0)={0x17c, r6, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc280}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_LINK={0x118, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xab}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x26b4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x17c}, 0x1, 0x0, 0x0, 0x4000}, 0x400004c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r7 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r7, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r7, &(0x7f0000000240)=ANY=[@ANYBLOB="004000000000000000ffffe0077136873f12e3979f9bbb733aa0cab3522ab7f9b40784db178b9ccf0df97fcca1c4d9fac0ba7bc42f6ebe81432ef8f46e4c09ac561fe80009e815af3089d32a0b5edac72bf7bd71a7bfce2e1eaed39581d7d0d510655d9ef034c79796ad2b0c0c1cb4454e6494d26b4b4dcf0dbaa05550427821722f1333ab788325ca4a0deb9ab52389f7840c59c53594287a"], 0xfdef) r8 = socket$inet(0x2, 0x5, 0xc5) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) r10 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r9, 0x84, 0x1f, &(0x7f00000000c0)={r11, @in={{0xa, 0x0, @empty}}}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r8, 0x84, 0x76, &(0x7f0000000100)={r11, 0x9}, 0x8) r12 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r12, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r12, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer2\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) mq_timedsend(r12, &(0x7f00000008c0)="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", 0x1000, 0x1, &(0x7f0000000080)={0x77359400}) 14:59:17 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:17 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 497.096308][T14484] tipc: Started in network mode [ 497.122975][T14484] tipc: Own node identity , cluster identity 4711 [ 497.130560][T14484] tipc: Failed to set node id, please configure manually [ 497.149684][T14484] tipc: Enabling of bearer rejected, failed to enable media 14:59:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{0x0}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 497.183734][T14486] FAT-fs (loop3): invalid media value (0x00) [ 497.271467][T14486] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 497.370304][T14494] tipc: Started in network mode [ 497.404253][T14494] tipc: Own node identity , cluster identity 4711 [ 497.413594][T14494] tipc: Failed to set node id, please configure manually [ 497.468994][T14494] tipc: Enabling of bearer rejected, failed to enable media 14:59:17 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:18 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000340)=0x4) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) rt_sigpending(&(0x7f0000000100), 0x8) connect$x25(r4, &(0x7f0000000080)={0x9, @null=' \x00'}, 0x12) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000000000000c4b0ceef8428e9eeb3c06224f99789c825e644fa1f5249e8e65b6b0ea1b31959d4b3e0b950c287db434d0000000000000062358696d6ab4e325b2526c8bef7ec92dbd2d2347d1b0bb8b4165220f76d96e9730b821df336567b524a0bff7f0000000000005c49ac60e73cdb5bbd8801c7ebd2462e8a30626357d79eae24a7b38841c91d1396d5e995e3466c9b7488581694b47bb46351ac7706bea6fc6d95b88710bed069b3f708fbe8911b1b6a6347f68bc98a52afc7744fb1d492989df6fac7d9f8a290a62f241348dde16859435ecc3e7786a2c6bd2e53d6d16ab0"], 0xfdef) 14:59:18 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:18 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) [ 497.963426][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 497.969355][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 498.063317][T14539] FAT-fs (loop3): invalid media value (0x00) [ 498.086183][T14539] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:20 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:20 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000140)=""/103) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="ffff00"/12], 0xfdef) 14:59:20 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 500.245050][T14555] FAT-fs (loop3): invalid media value (0x00) [ 500.283706][T14555] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:20 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:59:20 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:20 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:21 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000000be7a90aa0000"], 0xfdef) 14:59:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:23 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:23 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x1, 0x822) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f0000000400)) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) clone3(&(0x7f00000001c0)={0xced370a3149e536, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180), 0x3f, 0x0, &(0x7f0000000240)=""/123, 0x7b, &(0x7f00000002c0)=""/188}, 0x40) fcntl$setsig(r5, 0xa, 0x5) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0e00"/12], 0xfdef) 14:59:23 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 503.292587][T14615] FAT-fs (loop3): invalid media value (0x00) [ 503.312669][T14615] FAT-fs (loop3): Can't find a valid FAT filesystem [ 503.323474][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 503.329363][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:59:23 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) 14:59:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:24 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt(r2, 0x0, 0x40, &(0x7f0000000000), 0x18) fstat(r2, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [], {0x4, 0x2}, [{0x8, 0x0, r3}], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x1) lchown(&(0x7f0000000100)='./file1\x00', 0x0, r3) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x88091) r5 = fcntl$dupfd(0xffffffffffffffff, 0x605, r0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r6, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r6, 0xc008551b, &(0x7f0000000240)={0x6, 0xc, [0x4, 0xb6, 0x5]}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r7 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r7, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r7, &(0x7f0000000180)=ANY=[@ANYBLOB="0e00000000000000000000005f0a60f6e414adffebcdaabb47ec89cd4f978ec00e122be0e5255e464db2357abfeddbab847ee98f85f3aa6123de2c3f060abfbee4630bb9df5397f90e878efd0aa76621d3102a4aef286103ce58d36f01f5b58cabec9dfe"], 0xfdef) 14:59:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:26 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:26 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:26 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="0ebf000000e2ffffff000000"], 0xfdef) 14:59:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) [ 506.395659][T14677] FAT-fs (loop3): invalid media value (0x00) [ 506.403516][T14677] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:26 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:59:26 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x24000000) 14:59:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r0, 0x0, 0x24000000) 14:59:27 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r0, 0x0, 0x24000000) 14:59:27 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="0e000000000088cf57460f62396d98a587bf6cb400"/32], 0xfdef) 14:59:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) sendfile(r0, r0, 0x0, 0x24000000) 14:59:29 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:29 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) r4 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$KVM_GET_DIRTY_LOG(r5, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000ffd000/0x2000)=nil}) 14:59:29 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) [ 509.435253][T14725] FAT-fs (loop3): invalid media value (0x00) [ 509.441450][T14725] FAT-fs (loop3): Can't find a valid FAT filesystem 14:59:29 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x24000000) 14:59:29 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25SCAUSEDIAG(r4, 0x89ec, &(0x7f0000000140)={0x40, 0x1f}) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:59:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x24000000) 14:59:30 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) recvmsg$can_bcm(r3, &(0x7f0000000780)={&(0x7f0000000240)=@sco, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/137, 0x89}, {&(0x7f00000003c0)=""/18, 0x12}, {&(0x7f0000000400)=""/242, 0xf2}, {&(0x7f0000000500)=""/58, 0x3a}, {&(0x7f0000000540)=""/21, 0x15}, {&(0x7f0000000580)=""/94, 0x5e}], 0x6, &(0x7f0000000680)=""/242, 0xf2}, 0x2) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r4, 0x800448d3, &(0x7f0000000140)={{0x3, 0x20, 0x40, 0x4, 0xf8, 0x1}, 0x100, 0x0, 0x0, 0xde8, 0x800, "4dd815ab91bbcf2322a14bd096388bd87493749320dd7659f30b0bd1f1c7580526565600fc4f76ed93c028074d914ceca1adf035ead145432ac3caee83a078729c99e1965315eb47aad6f0a03e580649eba957dff58ca711c484526c07a2036dd9574b0a21665a282fb477ee9c8a1c967238fa5aa8750bbabd964ca1da061da7"}) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e000000000000000000000008e5847070fec6940fe61b8fa2fe3d244414e7c05eda8b3ad04614e3"], 0xfdef) 14:59:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x24000000) 14:59:30 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24000000) 14:59:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:32 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:32 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:32 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x200000, 0x0) write$uinput_user_dev(r3, &(0x7f00000003c0)={'syz1\x00', {0x800, 0x5, 0xff, 0x1}, 0x4f, [0xfffffffe, 0x8000000, 0xe1f, 0x9, 0x7, 0x7, 0x7, 0xed, 0x9, 0x1ff, 0x8, 0x2, 0x401, 0x4, 0x0, 0x9, 0xbe4d, 0x7, 0xdc, 0x8000, 0x6, 0xfffffffc, 0x5, 0x9cfa, 0x1000, 0x81, 0x5, 0x200, 0x1, 0x80, 0x0, 0x20, 0xffff, 0x7, 0x8, 0x7f, 0x2, 0x4, 0x80000001, 0x80000000, 0x1, 0x1, 0x3, 0x200, 0x3ff, 0x15, 0x0, 0x8001, 0x5, 0x6, 0xfff, 0xad9, 0x2, 0x6, 0xfffffffa, 0x6, 0x7f, 0x7f, 0x1, 0x20, 0x7, 0x5, 0x6, 0x100], [0x7, 0x8, 0x2, 0x6, 0x4, 0x4, 0x9, 0x24, 0xf9, 0x2, 0x8, 0x1ff, 0x5, 0xa52, 0x3ff, 0xffffff64, 0x6, 0xfffffffc, 0x9, 0xbd8, 0x8, 0x3ed5, 0x0, 0x1ff, 0x5, 0x7, 0x4, 0x9, 0x10001, 0x7, 0x7, 0x3e4, 0x7ff, 0xffff, 0x401, 0x8ef, 0x6, 0x9, 0x3ff, 0x80, 0x8, 0x7fffffff, 0x0, 0xfff, 0x0, 0x5, 0x4, 0x5, 0x3f, 0x4, 0x0, 0xffffff01, 0x9, 0xffff, 0x5, 0x9e7d, 0x8, 0x4, 0x7, 0x4, 0x5, 0x9, 0x0, 0xf792], [0x100, 0x3, 0x142a, 0x1, 0x8, 0x1, 0x8, 0x9, 0x7, 0x9b, 0x22, 0x659, 0x0, 0x314ba32e, 0x2d19, 0x1f, 0x7f, 0x3, 0xffffffb7, 0x0, 0x1000, 0x200, 0x1f, 0x1, 0x3ff, 0x8, 0x6, 0x8, 0x7fffffff, 0x11, 0x101, 0x101, 0x10000, 0x7fff, 0x0, 0x98, 0x7fff, 0xffffffe1, 0x7fffffff, 0x401, 0x7f, 0x2, 0x9, 0x9, 0x8, 0x1, 0x9, 0xff, 0x4, 0x1, 0x5, 0x2, 0x1, 0x0, 0x428, 0xfffffffa, 0x4, 0x10381950, 0x8, 0x8, 0x8, 0x7fff, 0x0, 0x544c4a2d], [0x4, 0x4, 0x5, 0x7ff, 0xfffff801, 0x100, 0xb73, 0x9, 0x200, 0x9, 0x7, 0x9, 0xd5e3, 0x8, 0xffff71da, 0x1, 0x5, 0x2, 0x401, 0xffff, 0x2, 0x3, 0x10000, 0x8000, 0x401, 0x7, 0x53374688, 0x8, 0x8, 0x7f, 0x7ff, 0xffffff65, 0x4, 0x303e, 0x8001, 0x800, 0x0, 0x7, 0x9, 0x2, 0xb9, 0xaba0, 0x4e3, 0x3ff, 0x87, 0x7fff, 0x9, 0x7ff, 0x1, 0x3ff, 0x20, 0x50a, 0x7, 0xfffffff8, 0x54, 0xffff, 0xfffffff7, 0x8, 0x8, 0xfffffbff, 0x4, 0x4, 0x8, 0x1]}, 0x45c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) r5 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r5, 0xc0e85667, &(0x7f0000000280)={0x80000000, 0x101, "8b3b0ad02da4db38963bb15a9524ae38da8249d6cfa6856acfa573342a10424f", 0x20000000000, 0xda, 0x10000, 0x3, 0x399c, 0x6a, 0x5, 0x8, [0x3, 0x6de0, 0x5, 0x2]}) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='xfs\x00', 0x381b61171ce42510, &(0x7f0000000240)='+-\x00') write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000840)=ANY=[@ANYBLOB="49000a75840000000000000075fb57f3480000000000003381d2e976635ab6283d5c22ad2d656109473545ce"], 0xfdef) 14:59:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24000000) 14:59:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:32 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, 0xffffffffffffffff, 0x0, 0x24000000) 14:59:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x0) 14:59:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:33 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) mount(&(0x7f0000000180)=@md0='/dev/md0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000240)='afs\x00', 0x8c020, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x7, 0xfffffffffffffff7}) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="0e000000797b1d10af96c648"], 0xfdef) 14:59:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x0) 14:59:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:33 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:33 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:33 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18, 0x73, 0x2000}, 0xfffffffffffffd78) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:59:33 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)='!', 0x1}], 0x1, 0x1ff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x0) 14:59:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:59:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(r1) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r2 = socket$kcm(0x2, 0x2000000000003, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, 0x0) r4 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x3}, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x4, 0x5}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r4, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='./cgroup/syz0\x00', r5}, 0x24c) perf_event_open(&(0x7f0000000600)={0x3, 0x70, 0x5, 0x13, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000005c0), 0x4}, 0x20, 0x7, 0x7fff, 0x1, 0x0, 0x5, 0x1}, r6, 0x0, 0xffffffffffffffff, 0x72ccd11d41a1d3aa) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x0, 0x0, r5}, 0x30) close(r2) r7 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r7, 0x107, 0xc, 0x0, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='cpu.stat\x00', 0x0, 0x0) r8 = socket$kcm(0x2, 0x0, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={r8}) 14:59:35 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x20000, 0x0) ioctl$TCFLSH(r2, 0x5405, 0x71dffc) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000080)) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r6, 0x5405, 0x71dffc) ioctl$PIO_UNIMAP(r6, 0x4b67, &(0x7f00000001c0)={0x8, &(0x7f0000000180)=[{0x200, 0x7ff}, {0x0, 0xb0a}, {0x4, 0x81b}, {0x9, 0x8}, {0x1000, 0x39}, {0x2, 0x6}, {0xe2b, 0x3}, {0x800, 0x101}]}) ioctl$TCFLSH(r5, 0x5405, 0x71dffc) ioctl$PIO_FONTRESET(r5, 0x4b6d, 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100), 0xfdef) 14:59:35 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:35 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 515.803588][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 515.809431][ C1] protocol 88fb is buggy, dev hsr_slave_1 14:59:36 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000100)) r4 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r5, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000080)=ANY=[@ANYBLOB="f9fffffffeffffff0000c8fe5a644d457dd9d30a"], 0x128) 14:59:36 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r0, r0, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(r1) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r2 = socket$kcm(0x2, 0x2000000000003, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, 0x0) r4 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x3}, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x4, 0x5}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r4, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='./cgroup/syz0\x00', r5}, 0x24c) perf_event_open(&(0x7f0000000600)={0x3, 0x70, 0x5, 0x13, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000005c0), 0x4}, 0x20, 0x7, 0x7fff, 0x1, 0x0, 0x5, 0x1}, r6, 0x0, 0xffffffffffffffff, 0x72ccd11d41a1d3aa) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x0, 0x0, r5}, 0x30) close(r2) r7 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r7, 0x107, 0xc, 0x0, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='cpu.stat\x00', 0x0, 0x0) r8 = socket$kcm(0x2, 0x0, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={r8}) 14:59:37 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x12}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) close(r1) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r2 = socket$kcm(0x2, 0x2000000000003, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8916, &(0x7f0000000200)='nr0\x01:\xf2%\xa3\'>\xf8]\x81$?\xfa\x02\x00UM\xbf\xef\xa9\xac\x03x\xf4D3A}?\x00\x8b\x9c[\xdd\x14\xa4\n\xf4\x94\xa8>\xb1\xb1\xa2_&') gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020660b, 0x0) r4 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2000000000401, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x3}, 0x0, 0x0, &(0x7f0000000800)={0x2, 0x2, 0x4, 0x5}, &(0x7f0000000380)=0x7, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={r4, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000100)='/dev/net/tun\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000280)='./cgroup/syz0\x00', r5}, 0x24c) perf_event_open(&(0x7f0000000600)={0x3, 0x70, 0x5, 0x13, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000005c0), 0x4}, 0x20, 0x7, 0x7fff, 0x1, 0x0, 0x5, 0x1}, r6, 0x0, 0xffffffffffffffff, 0x72ccd11d41a1d3aa) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x0, 0x0, r5}, 0x30) close(r2) r7 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r7, 0x107, 0xc, 0x0, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000940)='cpu.stat\x00', 0x0, 0x0) r8 = socket$kcm(0x2, 0x0, 0x2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={r8}) 14:59:39 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:39 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r0, r0, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:39 executing program 4: r0 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) r1 = accept4$unix(r0, &(0x7f0000000140)=@abs, &(0x7f0000000080)=0x6e, 0x80000) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r2, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)={0x0, 0x0}) r4 = getuid() r5 = socket$inet(0x2, 0x1, 0x0) setsockopt(r5, 0x0, 0x40, &(0x7f0000000000), 0x18) fstat(r5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [], {0x4, 0x2}, [{0x8, 0x0, r6}], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x1) r7 = socket$inet(0x2, 0x1, 0x0) setsockopt(r7, 0x0, 0x40, &(0x7f0000000000), 0x18) fstat(r7, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [], {0x4, 0x2}, [{0x8, 0x0, r8}], {0x10, 0x2}, {0x20, 0x2}}, 0x2c, 0x1) getgroups(0x6, &(0x7f00000001c0)=[0xee01, 0x0, r6, 0x0, 0xffffffffffffffff, r8]) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={r3, r4, r9}, 0xc) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = socket$packet(0x11, 0x2, 0x300) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r13 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r13, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r13, &(0x7f0000000100), 0xfdef) 14:59:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:59:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:39 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="e69689693119f8e7d1faffab7cd99a5ac6a5701c9f078243a1aa81e3f500000000"], 0xfdef) r4 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) getsockname$llc(r4, &(0x7f0000000080), &(0x7f0000000140)=0x10) 14:59:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1000000, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800004000"}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0xfffffffffffffff8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e23, 0x1, @mcast2, 0x40}}, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x19) r3 = dup2(0xffffffffffffffff, r2) accept4(r3, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000280)={0xf3d0004, 0x2, 0xea, [], &(0x7f0000000240)={0x990afc, 0x200, [], @p_u32=&(0x7f0000000200)=0x8}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x102000) io_uring_enter(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1\x00'}, 0xf62c3dc8da425be8) socket(0x40000000002, 0x3, 0x2) bind$rds(0xffffffffffffffff, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r6, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x200008c1}, 0x4000) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000000001a8cf849adcb60d445008ed0d339962614da9a3b50310fe0f66d5f1dada53684b0061e54897e0000000000000028a52f7d2c36ac24ad1aa6deb1e6e994cd43c076bd5cbbc9dafdc873caeacdc179de4ff7c641286e34deae97bd4a4259db030e4203481151a10bbbd41fab3fee81208ab7f6f64ca77d42ff8c28a99fe2a824396bc1bab053ed08b0", @ANYRES16=r6, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x30000000}, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001140)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c9a5f43c82dd054e35171c0024004e655200e8c95de359a2ba6c7f88e7afe8a9adee595b6a2448f4a0dfa6ddb4efcd916d1c35df0547ea68e241b005399b01fd1bb5cf7c80420e946d497b7c378bc84d666b00100000d8dc29e11f360b903aef49b04bd676937bad0d078d9f371607e1370da0a7cb01c766198e840581a505fb8c85d26f3f287fca7afec57d86875ff7586b962b67b962eef3ec52b447e7f939550f7c05dc748ba6798785bb853e156b0d7c55ad0b78114f49", @ANYRES16=r6, @ANYBLOB="000225ed261607600de29baabcbd7000f7dbdf255b345e83dd52bc1100000000"], 0x3}, 0x1, 0x0, 0x0, 0x4001}, 0x40002) 14:59:39 executing program 4: r0 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000100)={{0x8, 0x68, 0x1, 0x1, 0x0, 0x40}, 0x9}) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r1, 0x0, 0x0) setsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000000140)=0x1, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f0000000080)) r3 = socket$packet(0x11, 0x2, 0x300) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fdatasync(r2) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r5, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="0e0000027ef1000000000e385511c3dbe3abff37ad04965c306bc2b7ba99506e225479b2089ec136034d3f0110db8482857156647957ee3b0d500a661236baf1f5668c3e0bf7c42adbdc1c73fcd080ec6d9839ab978b1707dc772123f6fb03870d75055f5367ebc92bf0fa5bb38377bc7477ed6174f86a829b11819781336cc5d457ffcb79734b6254770435026d1006800011cd1db7a6"], 0xc) 14:59:39 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r0, r0, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:39 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) syz_genetlink_get_family_id$devlink(0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1000000, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800004000"}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0xfffffffffffffff8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e23, 0x1, @mcast2, 0x40}}, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x19) r3 = dup2(0xffffffffffffffff, r2) accept4(r3, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000280)={0xf3d0004, 0x2, 0xea, [], &(0x7f0000000240)={0x990afc, 0x200, [], @p_u32=&(0x7f0000000200)=0x8}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x102000) io_uring_enter(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1\x00'}, 0xf62c3dc8da425be8) socket(0x40000000002, 0x3, 0x2) bind$rds(0xffffffffffffffff, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r6, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x200008c1}, 0x4000) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000000001a8cf849adcb60d445008ed0d339962614da9a3b50310fe0f66d5f1dada53684b0061e54897e0000000000000028a52f7d2c36ac24ad1aa6deb1e6e994cd43c076bd5cbbc9dafdc873caeacdc179de4ff7c641286e34deae97bd4a4259db030e4203481151a10bbbd41fab3fee81208ab7f6f64ca77d42ff8c28a99fe2a824396bc1bab053ed08b0", @ANYRES16=r6, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x30000000}, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001140)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c9a5f43c82dd054e35171c0024004e655200e8c95de359a2ba6c7f88e7afe8a9adee595b6a2448f4a0dfa6ddb4efcd916d1c35df0547ea68e241b005399b01fd1bb5cf7c80420e946d497b7c378bc84d666b00100000d8dc29e11f360b903aef49b04bd676937bad0d078d9f371607e1370da0a7cb01c766198e840581a505fb8c85d26f3f287fca7afec57d86875ff7586b962b67b962eef3ec52b447e7f939550f7c05dc748ba6798785bb853e156b0d7c55ad0b78114f49", @ANYRES16=r6, @ANYBLOB="000225ed261607600de29baabcbd7000f7dbdf255b345e83dd52bc1100000000"], 0x3}, 0x1, 0x0, 0x0, 0x4001}, 0x40002) 14:59:40 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = getpid() sched_setattr(r2, &(0x7f00000007c0)={0x298, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x284400, 0x0) r6 = getpgid(0x0) r7 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r8 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r9 = dup2(r8, r7) writev(r9, &(0x7f0000000040)=[{&(0x7f00000002c0)='3', 0x1}], 0x1) ppoll(&(0x7f0000000200)=[{r9}], 0x1, &(0x7f0000000280), 0x0, 0x0) r10 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = inotify_init1(0x0) fcntl$setown(r11, 0x8, 0xffffffffffffffff) fcntl$getownex(r11, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r13 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r13, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="020000000100eb0000000000020001", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\b\x00\x00', @ANYBLOB="800100", @ANYRES32, @ANYBLOB="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", @ANYBLOB], 0x8, 0x1) r14 = socket(0xa, 0x3, 0x8) r15 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r14, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r15, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r14, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r17 = gettid() waitid(0x83b895581628fca4, r17, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r14, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r16, @ANYRESDEC=r17]], 0xfffffffffffffe56}}, 0x20004850) r18 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r19 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r20 = dup2(r19, r18) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r20, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r21 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r21) r22 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r22, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r22, 0x227d, &(0x7f0000000780)) kcmp(r21, r17, 0x0, 0xffffffffffffffff, r22) ptrace$setopts(0x4206, r21, 0x0, 0x0) r23 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x104, 0x7, 0x9, 0x2}, &(0x7f0000000380)=0x1, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xfffffffffffffca9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r21, r23, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r17, r20, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r24}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r24}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r24}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r12, r13, 0x0, 0x1, &(0x7f0000000080)='\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r10, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r24}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r9, 0x0, 0x5, &(0x7f00000000c0)='syz1\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)='bdevmd5sum@selinuxuser\x0e-em0lo{-em0&:%buser', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r5, 0x0, 0x5, &(0x7f0000000040)='sit0\x00', r24}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r4, 0x0, 0x6, &(0x7f0000000080)='wlan0\x00', r24}, 0x30) ioprio_set$pid(0x2, r25, 0x100000000) r26 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r27 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r27, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r27, &(0x7f0000000100), 0xfdef) [ 519.930487][T15006] bridge0: port 3(gretap0) entered blocking state [ 519.942174][T15006] bridge0: port 3(gretap0) entered disabled state [ 519.960403][T15006] device gretap0 entered promiscuous mode [ 519.963476][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 519.972002][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 520.022730][T15006] bridge0: port 3(gretap0) entered blocking state [ 520.029579][T15006] bridge0: port 3(gretap0) entered forwarding state 14:59:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 14:59:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1000000, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800004000"}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0xfffffffffffffff8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e23, 0x1, @mcast2, 0x40}}, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x19) r3 = dup2(0xffffffffffffffff, r2) accept4(r3, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000280)={0xf3d0004, 0x2, 0xea, [], &(0x7f0000000240)={0x990afc, 0x200, [], @p_u32=&(0x7f0000000200)=0x8}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x102000) io_uring_enter(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1\x00'}, 0xf62c3dc8da425be8) socket(0x40000000002, 0x3, 0x2) bind$rds(0xffffffffffffffff, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r6, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x200008c1}, 0x4000) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000000001a8cf849adcb60d445008ed0d339962614da9a3b50310fe0f66d5f1dada53684b0061e54897e0000000000000028a52f7d2c36ac24ad1aa6deb1e6e994cd43c076bd5cbbc9dafdc873caeacdc179de4ff7c641286e34deae97bd4a4259db030e4203481151a10bbbd41fab3fee81208ab7f6f64ca77d42ff8c28a99fe2a824396bc1bab053ed08b0", @ANYRES16=r6, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x30000000}, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001140)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c9a5f43c82dd054e35171c0024004e655200e8c95de359a2ba6c7f88e7afe8a9adee595b6a2448f4a0dfa6ddb4efcd916d1c35df0547ea68e241b005399b01fd1bb5cf7c80420e946d497b7c378bc84d666b00100000d8dc29e11f360b903aef49b04bd676937bad0d078d9f371607e1370da0a7cb01c766198e840581a505fb8c85d26f3f287fca7afec57d86875ff7586b962b67b962eef3ec52b447e7f939550f7c05dc748ba6798785bb853e156b0d7c55ad0b78114f49", @ANYRES16=r6, @ANYBLOB="000225ed261607600de29baabcbd7000f7dbdf255b345e83dd52bc1100000000"], 0x3}, 0x1, 0x0, 0x0, 0x4001}, 0x40002) 14:59:42 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000080)=0xfffffffd, 0x4) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100), 0xfdef) 14:59:42 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:42 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1000000, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800004000"}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0xfffffffffffffff8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e23, 0x1, @mcast2, 0x40}}, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x19) r3 = dup2(0xffffffffffffffff, r2) accept4(r3, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000280)={0xf3d0004, 0x2, 0xea, [], &(0x7f0000000240)={0x990afc, 0x200, [], @p_u32=&(0x7f0000000200)=0x8}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x102000) io_uring_enter(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1\x00'}, 0xf62c3dc8da425be8) socket(0x40000000002, 0x3, 0x2) bind$rds(0xffffffffffffffff, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r6, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x200008c1}, 0x4000) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000000001a8cf849adcb60d445008ed0d339962614da9a3b50310fe0f66d5f1dada53684b0061e54897e0000000000000028a52f7d2c36ac24ad1aa6deb1e6e994cd43c076bd5cbbc9dafdc873caeacdc179de4ff7c641286e34deae97bd4a4259db030e4203481151a10bbbd41fab3fee81208ab7f6f64ca77d42ff8c28a99fe2a824396bc1bab053ed08b0", @ANYRES16=r6, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x30000000}, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001140)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c9a5f43c82dd054e35171c0024004e655200e8c95de359a2ba6c7f88e7afe8a9adee595b6a2448f4a0dfa6ddb4efcd916d1c35df0547ea68e241b005399b01fd1bb5cf7c80420e946d497b7c378bc84d666b00100000d8dc29e11f360b903aef49b04bd676937bad0d078d9f371607e1370da0a7cb01c766198e840581a505fb8c85d26f3f287fca7afec57d86875ff7586b962b67b962eef3ec52b447e7f939550f7c05dc748ba6798785bb853e156b0d7c55ad0b78114f49", @ANYRES16=r6, @ANYBLOB="000225ed261607600de29baabcbd7000f7dbdf255b345e83dd52bc1100000000"], 0x3}, 0x1, 0x0, 0x0, 0x4001}, 0x40002) 14:59:42 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000140)=""/79) read$usbmon(r3, &(0x7f0000000240)=""/226, 0xe2) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) 14:59:42 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1000000, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800004000"}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x10000000d) request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0xfffffffffffffff8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e23, 0x1, @mcast2, 0x40}}, 0x0, 0x0, 0x0, 0x0, 0x144}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x19) r3 = dup2(0xffffffffffffffff, r2) accept4(r3, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000280)={0xf3d0004, 0x2, 0xea, [], &(0x7f0000000240)={0x990afc, 0x200, [], @p_u32=&(0x7f0000000200)=0x8}}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x102000) io_uring_enter(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1\x00'}, 0xf62c3dc8da425be8) socket(0x40000000002, 0x3, 0x2) bind$rds(0xffffffffffffffff, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r6, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x51}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfe}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x200008c1}, 0x4000) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f0000000a00)=ANY=[@ANYBLOB="000000001a8cf849adcb60d445008ed0d339962614da9a3b50310fe0f66d5f1dada53684b0061e54897e0000000000000028a52f7d2c36ac24ad1aa6deb1e6e994cd43c076bd5cbbc9dafdc873caeacdc179de4ff7c641286e34deae97bd4a4259db030e4203481151a10bbbd41fab3fee81208ab7f6f64ca77d42ff8c28a99fe2a824396bc1bab053ed08b0", @ANYRES16=r6, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x30000000}, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001140)={&(0x7f0000000d80)=ANY=[@ANYBLOB="c9a5f43c82dd054e35171c0024004e655200e8c95de359a2ba6c7f88e7afe8a9adee595b6a2448f4a0dfa6ddb4efcd916d1c35df0547ea68e241b005399b01fd1bb5cf7c80420e946d497b7c378bc84d666b00100000d8dc29e11f360b903aef49b04bd676937bad0d078d9f371607e1370da0a7cb01c766198e840581a505fb8c85d26f3f287fca7afec57d86875ff7586b962b67b962eef3ec52b447e7f939550f7c05dc748ba6798785bb853e156b0d7c55ad0b78114f49", @ANYRES16=r6, @ANYBLOB="000225ed261607600de29baabcbd7000f7dbdf255b345e83dd52bc1100000000"], 0x3}, 0x1, 0x0, 0x0, 0x4001}, 0x40002) 14:59:42 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r3, 0x0, 0x0) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0x8000) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x88) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100), 0xfdef) 14:59:42 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket(0xa, 0x1007, 0xfa) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r5, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x1cc, r6, 0xfc81e635cf36c1b0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x120, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc3}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x200, @ipv4={[], [], @multicast1}, 0xf6cd}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x98, @ipv4={[], [], @broadcast}, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsf0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x716a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9dd5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffff001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x66}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x80}, 0x10) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000740)=""/4096) dup(0xffffffffffffffff) r7 = socket(0x10, 0x0, 0x64) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000600)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x85000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x40, r8, 0x300, 0x70bd2a, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x77}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffff8000}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000005}, 0x4000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x360, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38010000100013070000000000000000fe8000000000000000000000000000190000000000000000002a39294d5b0000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001006d643500"/240], 0x138}}, 0x0) [ 522.677884][T15071] devpts: called with bogus options [ 523.452514][T15078] devpts: called with bogus options 14:59:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:59:45 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:45 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="0e0000e0ffff53ffffffffff00"], 0xfdef) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xa002, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000380)={0x2, 0x4e20, @multicast1}, 0xfffffffffffffda6) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) sendto$inet(r5, 0x0, 0x0, 0x2404973d, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000100)={0x3485, 0x9, 0x2, 0x3}, 0x8) setsockopt$inet6_mreq(r4, 0x29, 0x0, &(0x7f0000000140)={@local}, 0x14) 14:59:45 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 524.923446][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 524.929299][ C0] protocol 88fb is buggy, dev hsr_slave_1 14:59:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:45 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket(0xa, 0x1007, 0xfa) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r5, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x1cc, r6, 0xfc81e635cf36c1b0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x120, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc3}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x200, @ipv4={[], [], @multicast1}, 0xf6cd}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x98, @ipv4={[], [], @broadcast}, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsf0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x716a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9dd5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffff001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x66}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x80}, 0x10) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000740)=""/4096) dup(0xffffffffffffffff) r7 = socket(0x10, 0x0, 0x64) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000600)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x85000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x40, r8, 0x300, 0x70bd2a, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x77}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffff8000}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000005}, 0x4000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x360, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38010000100013070000000000000000fe8000000000000000000000000000190000000000000000002a39294d5b0000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001006d643500"/240], 0x138}}, 0x0) [ 525.130574][T15103] devpts: called with bogus options 14:59:45 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = socket(0xa, 0x1007, 0xfa) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r5, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x1cc, r6, 0xfc81e635cf36c1b0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x120, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc3}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x200, @ipv4={[], [], @multicast1}, 0xf6cd}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x98, @ipv4={[], [], @broadcast}, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsf0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x716a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9dd5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffff001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x66}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4a}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x80}, 0x10) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000740)=""/4096) dup(0xffffffffffffffff) r7 = socket(0x10, 0x0, 0x64) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000600)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x85000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x40, r8, 0x300, 0x70bd2a, 0x0, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x77}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xffff8000}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000005}, 0x4000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x360, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38010000100013070000000000000000fe8000000000000000000000000000190000000000000000002a39294d5b0000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001006d643500"/240], 0x138}}, 0x0) 14:59:45 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={r2}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000000c0)={r6, @in={{0xa, 0x0, @empty}}}, &(0x7f0000000040)=0x90) sendmsg$sock(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0)=@nfc={0x27, 0x1, 0x1, 0x7}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000340)="619f5cab5ca979b8f8b3eb8615c63722ad7b3e4d819d0ffc2f8f53b0e9ef7722af50f36fdb63", 0x26}, {&(0x7f0000000440)="2e98d3a5b0fb30994a9d213116e5b99988339661450cea6bf7c7a1a86e665c60d203e69b8d79791e2cfa80352b19196a8d60d799627def8b6e937f5603298a525ab425becf2dd1c60624891ba8aa8e45d6c643dd73bcb0d11b128443421cf482f31cea83520b4d44fe95c5c408ea9a85be275b33ffc559d7d50a7ce7c3fbba6bf1d44d7a347b25a3080545301eecf7fbb725e1be4b5c29fcef7bbec735083fe87c616fd67d625efb096da7a5c831a5a5700b2fb8438f4412bc71d2dd62188d6c9e393c2ace1c7cd6d1dff6828ae334d5b483f94f00", 0xd5}], 0x2, &(0x7f0000000580)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x18}, 0x4008828) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000240)={r6, 0x8c, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x2, @local, 0xfff}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e22, @local}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r7, 0x1}, 0x8) r8 = socket$packet(0x11, 0x2, 0x300) r9 = fcntl$dupfd(r0, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r10 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r11, 0x0, 0x0) ioctl$EVIOCSMASK(r11, 0x40104593, &(0x7f0000000300)={0x0, 0x1000, &(0x7f00000008c0)="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"}) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000600)) write$P9_RCREATE(r10, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r10, &(0x7f0000000100), 0xfdef) [ 525.356045][T15089] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 525.369871][T15089] FAT-fs (loop3): Filesystem has been set read-only [ 525.376999][T15089] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 525.404712][T15114] devpts: called with bogus options 14:59:45 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) ioprio_set$pid(0x2, r2, 0x2) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000180)={0x1, 0x5, 0x3ff, 0x0, 0x2e}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r6 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r6, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r6, &(0x7f0000000080)=ANY=[@ANYBLOB="65980e00"/14], 0xfdef) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x800, 0x0) 14:59:46 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) syz_genetlink_get_family_id$devlink(0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:46 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="8e00"/12], 0xfdef) [ 526.129363][T15127] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 526.151627][T15127] FAT-fs (loop3): Filesystem has been set read-only [ 526.163922][T15127] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:59:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:59:48 executing program 5: gettid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000480)={'\x00\x00\x04\x00', 0x4fff}) r2 = open(&(0x7f0000002000)='./bus\x00', 0xc0000, 0x0) ftruncate(r2, 0x2007fff) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) write(r4, &(0x7f00000001c0), 0xfffffef3) openat$cgroup_ro(r2, &(0x7f0000000140)='\x9e\xb44F\x9d\xc6cpua\x02\x00\x00\x00_\xce\rl\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, 0x0) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x0, &(0x7f0000000300)) r5 = open(&(0x7f0000000500)='./bus\x00', 0x8141042, 0x80) close(r5) r6 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x100, 0x105082) r7 = memfd_create(&(0x7f0000000000)='\x00\x00', 0x0) pwritev(r7, &(0x7f0000000c80)=[{&(0x7f0000000640)="ddde3585e51be3fd9cbd8f4e7f04e2bd4ad846b960640f975fd23817f56068efa1ed28bd226cfe44073cd070a0ff4b810f3a07a53ed03f9a8638e5711655a4f659ce14e5a42afe8fed87d9488b789da6c857e513fb3c145547ec3da8c10ec3fbf81be3f9820527656cd1a21211a59abc0e5b343d5e", 0x75}, {&(0x7f00000009c0)="5038ae1bc600ccf097cba43c0ed892675dde5fb570c956fc6ebc4d88ae6c86802b6c648fab55a97c18dcd17e3f8f9014eb660edd488c734c34161b55e01576f5f041c5e3021d0fa491413c6b9c451b9eb02a616acd85ab2b5a9c207e6bc33c31316451894b5eebfe26ab2eb4e01a54e00974b0332058d6208dde5440", 0x7c}, {&(0x7f0000000540)="d9e24d", 0x3}, {&(0x7f0000000ac0)="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", 0xfc}, {&(0x7f0000000780)="33dada9abe953f45a780ee2646e091c614ccd1a7c66c0fbf9fce0e251c49dfa21b21a1d8380d65bdaf560babb4e1bba0d9eb1c1b", 0x34}, {&(0x7f0000000bc0)="5db4996506557eac98d21aa62e523ae1011bcd1e3e3e14c9a86650ee060a7e089ada1b0ee98b199a2641c89f3131226a483e88bb7b3f8426e191fb09cdfff0ad339022c2a3c43006693cee116cf9f372cabfc14a03ab7f25310cdef7d38fddc72edf1f569c7b19f8b114cee7cb0fc796fd3e996528e1f3bfa64066518fa247a63801379427d843b6e43a39cd427d2217e416bb0e46ff0543d29e8d0224ee46056882285e5b9d572f8337", 0xaa}], 0x6, 0x81000) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r5, 0x0) fcntl$setstatus(r5, 0x4, 0x0) sendfile(r6, r5, 0x0, 0x80004) r8 = socket(0x5, 0x6, 0xa) write(r8, &(0x7f0000000580)="124d78445329ca4fa79d00d7530100effa90bf3be1ad", 0x16) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000980)=ANY=[@ANYRESDEC=0x0, @ANYRES16=r8], 0x2}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) sendfile(r4, r8, 0x0, 0x8000fffffffe) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) pipe(&(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)) 14:59:48 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:48 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socket$packet(0x11, 0x2, 0x300) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x800) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) r3 = fcntl$dupfd(r2, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) r5 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r5, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$RTC_UIE_ON(r6, 0x7003) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0e00e1ffffff06001d000000"], 0xfdef) 14:59:48 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) syz_genetlink_get_family_id$devlink(0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:48 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) r4 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) ioctl$IOC_PR_RELEASE(r4, 0x401070ca, &(0x7f0000000840)={0x3f, 0x1}) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) r5 = creat(&(0x7f0000000080)='./file0/bus\x00', 0x1a9) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) r6 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r6, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r6, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r7, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') ioctl$NS_GET_NSTYPE(r7, 0xb703, 0x0) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) recvmsg$kcm(r9, 0x0, 0x0) r10 = getpgid(0x0) write$FUSE_LK(r9, &(0x7f00000018c0)={0x28, 0x0, 0x6, {{0xffff, 0xfffffffffffff972, 0x2, r10}}}, 0x28) recvmsg$can_bcm(r8, &(0x7f0000000780)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)=""/229, 0xe5}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/25, 0x19}, {&(0x7f00000003c0)=""/153, 0x99}, {&(0x7f0000000340)=""/31, 0x1f}, {&(0x7f0000000480)=""/51, 0x33}, {&(0x7f00000004c0)=""/151, 0x97}, {&(0x7f0000000580)=""/129, 0x81}], 0x8, &(0x7f00000006c0)=""/134, 0x86}, 0x10001) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x44922, 0x0) ioctl$TCFLSH(r11, 0x5405, 0x71dffc) ioctl$TIOCGSOFTCAR(r11, 0x5419, &(0x7f00000007c0)) setsockopt$inet6_int(r5, 0x29, 0x17, &(0x7f0000000800)=0x795, 0x4) [ 528.519969][ T27] audit: type=1804 audit(1574693988.858:54): pid=15163 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir096472910/syzkaller.XDNpb5/261/bus" dev="sda1" ino=16594 res=1 14:59:49 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0e0000126e8af509c9219689000000dfff5f067eaab06a0000"], 0xfdef) [ 528.643422][ T27] audit: type=1804 audit(1574693988.938:55): pid=15154 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir096472910/syzkaller.XDNpb5/261/bus" dev="sda1" ino=16594 res=1 14:59:49 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000040)) 14:59:49 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:49 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_aout(r1, &(0x7f0000000740)=ANY=[@ANYBLOB="00000040000000005f0300000600000099010000000000000000000000000000286463d662327da35fe7467311aec0091cdb4c5024d59812fd58961ace6e330935e1cdfee74a986931f5bb80930d398d46ae7644e100"/201], 0xc9) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7515bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) 14:59:49 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 529.419546][T15208] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 529.451183][T15208] FAT-fs (loop3): Filesystem has been set read-only [ 529.472789][T15208] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:59:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 14:59:51 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f00000000c0)=0x3bf) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000240)=0x68) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x4, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f0000000080)='./file0\x00', 0x80) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="0e000000006e60c9b91ef18e"], 0xfdef) r4 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f0000000140)={0x7, 0x7, 0x2}) 14:59:51 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:51 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:51 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 14:59:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:51 executing program 5: 14:59:51 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = open(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000940)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000080)={0x1}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r5, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000100), 0xfdef) 14:59:51 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:51 executing program 5: 14:59:51 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) fcntl$dupfd(r0, 0x0, r1) r2 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r3 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100), 0xfdef) 14:59:52 executing program 5: 14:59:54 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:54 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0e0000000000000000000000a40a2bf908e55520d47957d8c33418ab3f06b36cb5d1701c583e40fc45b156b32b1fb4f63ec33abf7739c5888fc8"], 0xfdef) 14:59:54 executing program 5: 14:59:54 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 14:59:54 executing program 1: 14:59:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51636cabc3de2e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb07fd71d3f6b7fcb8be72e99075fa88128276bb0f3bede", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 14:59:54 executing program 5: 14:59:54 executing program 1: 14:59:54 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpid() sched_setattr(r3, &(0x7f00000007c0)={0x298, 0x2, 0x0, 0x0, 0x5}, 0x0) migrate_pages(r3, 0x4, &(0x7f0000000080)=0x8, &(0x7f0000000140)=0x2) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r4, &(0x7f0000000040)={0x18}, 0x18) creat(&(0x7f00000000c0)='./file0/bus\x00', 0x0) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0e0000000000400000000000"], 0xfdef) 14:59:54 executing program 5: [ 534.614933][T15293] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 14:59:55 executing program 5: 14:59:55 executing program 1: [ 534.674790][T15293] FAT-fs (loop3): Filesystem has been set read-only [ 534.705521][T15293] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 534.760963][T15285] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 534.835158][T15285] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 14:59:55 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="ff5b7213b6012f66b000000000e00200ffffffff"], 0x14) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) open(0x0, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781659f8056d1d3abf9d1a54bfce1e77551a8bd678625f5083067b024a211847bc2fdffffffffffffff87"], 0x3c) sendfile(r1, r1, &(0x7f0000000000)=0x26, 0x8080fffffffe) 14:59:55 executing program 5: 14:59:55 executing program 4: mkdir(&(0x7f0000639000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) iopl(0x3) mount(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) write$P9_RCREATE(r3, &(0x7f0000000040)={0x18}, 0x18) r4 = creat(&(0x7f00000000c0)='./file0/bus\x00', 0x40) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r5, 0x5405, 0x71dffc) r6 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r6, 0x84, 0x7, &(0x7f0000000540)={0x2}, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) close(r8) splice(r7, 0x0, r8, 0x0, 0xe47, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000300)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000240)={@dev={0xfe, 0x80, [], 0x15}, r9}, 0x14) bind$packet(r2, &(0x7f0000000280)={0x11, 0xe, r9, 0x1, 0x81, 0x6, @broadcast}, 0x14) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000240)={0x6, 0x1ff, 0x81, 0xfffb}) ioctl$KDGKBMODE(r5, 0x4b44, &(0x7f0000000080)) r10 = getpid() sched_setattr(r10, &(0x7f00000007c0)={0x298, 0x2, 0x0, 0x0, 0x5}, 0x0) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r11, 0x5405, 0x71dffc) ioctl$TIOCGSID(r11, 0x5429, &(0x7f00000002c0)=0x0) r13 = open(0x0, 0x111400, 0x7) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r13, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r13, 0x84, 0x73, 0x0, &(0x7f0000000000)=0xffffffffffffff79) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x3}, 0x8) r14 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r14, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="2e00000020000903d22780648c6394fb0124fc0010000b400c000200053582c137153e370900018025643000d1bd", 0x2e}], 0x1}, 0x0) kcmp$KCMP_EPOLL_TFD(r10, r12, 0x7, r7, &(0x7f0000000400)={r13, r14, 0x8}) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100), 0xfdef) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000140)="91bf7b908e14702fe0e7318bcd3c3e8c5398db14daa99e9f1b01cde36fdc586e139366dfe48daf7dd64b17242514c56339792fe74a67f8ee66aaebe206d5cde1f30085010b85c41072b7d56ba77076285a5e488afd09d215857262d7595f395599e7c30236f2e7ec67266bafced174e8272627b2da0dae315ffd0b0365d9b3a2c6fa0bb109a0f0eeefab60cc895990") [ 534.979344][T15323] kasan: CONFIG_KASAN_INLINE enabled [ 534.983711][ T9102] kobject: 'loop3' (00000000cb5f7021): kobject_uevent_env [ 534.984990][T15323] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 534.985022][T15323] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 534.985043][T15323] CPU: 1 PID: 15323 Comm: syz-executor.4 Not tainted 5.4.0-rc8-next-20191125-syzkaller #0 [ 534.993148][ T9102] kobject: 'loop3' (00000000cb5f7021): fill_kobj_path: path = '/devices/virtual/block/loop3' 14:59:55 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @local}}}, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x40001d0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x65c15bf2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x0, [], "d92da9b93997170ce63a9c8d7b08884a"}) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r3, 0x0) syz_genetlink_get_family_id$devlink(0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) socket$inet6_sctp(0xa, 0x0, 0x84) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 535.001167][T15323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.001192][T15323] RIP: 0010:tss_update_io_bitmap+0x138/0x590 [ 535.001207][T15323] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9e 03 00 00 4c 89 ea 4c 8b 73 68 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 72 03 00 00 4d 3b 75 00 0f 85 35 02 00 00 48 8d [ 535.001213][T15323] RSP: 0018:ffff8880916c7e80 EFLAGS: 00010046 [ 535.001224][T15323] RAX: dffffc0000000000 RBX: ffff8880ae90a000 RCX: ffffffff812a40a8 14:59:55 executing program 1: [ 535.001231][T15323] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880ae90a068 [ 535.001238][T15323] RBP: ffff8880916c7f10 R08: 1ffff1100b4ac890 R09: ffffed100b4ac891 [ 535.001252][T15323] R10: ffffed100b4ac890 R11: ffff88805a564487 R12: 1ffff110122d8fd2 [ 535.102422][T15323] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 535.102444][ T4007] kobject: 'loop3' (00000000cb5f7021): kobject_uevent_env [ 535.110384][T15323] FS: 00007fd823012700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 535.110392][T15323] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 535.110398][T15323] CR2: 0000001b2cb25000 CR3: 00000000a866f000 CR4: 00000000001406e0 [ 535.110408][T15323] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 535.110415][T15323] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 535.110419][T15323] Call Trace: [ 535.110444][T15323] ? set_tsc_mode+0x330/0x330 [ 535.142986][ T4007] kobject: 'loop3' (00000000cb5f7021): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 535.149061][T15323] ? lockdown_is_locked_down+0x42/0xb4 [ 535.149082][T15323] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.149096][T15323] ? trace_hardirqs_off+0x62/0x240 [ 535.149108][T15323] ? task_update_io_bitmap+0x78/0xe0 [ 535.149128][T15323] do_syscall_64+0x685/0x790 [ 535.181093][ T4007] kobject: 'loop2' (00000000c44360ed): kobject_uevent_env [ 535.186945][T15323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.186955][T15323] RIP: 0033:0x45a639 [ 535.186968][T15323] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 535.186980][T15323] RSP: 002b:00007fd823011c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000ac [ 535.215231][ T4007] kobject: 'loop2' (00000000c44360ed): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 535.218789][T15323] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 000000000045a639 [ 535.218797][T15323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 535.218805][T15323] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 535.218811][T15323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8230126d4 [ 535.218824][T15323] R13: 00000000004c6c42 R14: 00000000004dc2e0 R15: 00000000ffffffff [ 535.296780][T15323] Modules linked in: [ 535.300694][T15323] ---[ end trace 0c0a673047d51bbb ]--- [ 535.306164][T15323] RIP: 0010:tss_update_io_bitmap+0x138/0x590 [ 535.312153][T15323] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9e 03 00 00 4c 89 ea 4c 8b 73 68 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 72 03 00 00 4d 3b 75 00 0f 85 35 02 00 00 48 8d [ 535.331847][T15323] RSP: 0018:ffff8880916c7e80 EFLAGS: 00010046 [ 535.337929][T15323] RAX: dffffc0000000000 RBX: ffff8880ae90a000 RCX: ffffffff812a40a8 [ 535.345916][T15323] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880ae90a068 [ 535.353893][T15323] RBP: ffff8880916c7f10 R08: 1ffff1100b4ac890 R09: ffffed100b4ac891 [ 535.361876][T15323] R10: ffffed100b4ac890 R11: ffff88805a564487 R12: 1ffff110122d8fd2 [ 535.369861][T15323] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 535.377848][T15323] FS: 00007fd823012700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 535.386782][T15323] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 535.393371][T15323] CR2: 0000001b2cb25000 CR3: 00000000a866f000 CR4: 00000000001406e0 [ 535.401350][T15323] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 535.409332][T15323] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 535.417316][T15323] Kernel panic - not syncing: Fatal exception [ 535.424825][T15323] Kernel Offset: disabled [ 535.429152][T15323] Rebooting in 86400 seconds..